Mageia alert MGASA-2012-0355 (libtiff)
From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
To: | updates-announce@ml.mageia.org | |
Subject: | [updates-announce] MGASA-2012-0355: libtiff-4.0.1-2.5.mga2 (2/core) | |
Date: | Fri, 7 Dec 2012 22:41:09 +0100 | |
Message-ID: | <20121207214109.GA7130@valstar.mageia.org> |
MGASA-2012-0355 Date: December 7th, 2012 Affected releases: 2 Description: Updated libtiff packages fix security vulnerability: It was discovered that LibTIFF incorrectly handled certain malformed images using the DOTRANGE tag. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could crash the application, leading to a denial of service, or possibly execute arbitrary code with user privileges (CVE-2012-5581). Updated Packages: lib(64)tiff5-4.0.1-2.5.mga2 lib(64)tiff-devel-4.0.1-2.5.mga2 lib(64)tiff-static-devel-4.0.1-2.5.mga2 libtiff-progs-4.0.1-2.5.mga2 References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5581 http://www.ubuntu.com/usn/usn-1655-1/ https://bugs.mageia.org/show_bug.cgi?id=8317 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-...