Scientific Linux alert SL-libt-20120411 (libtiff)
| From: | riehecky@fnal.gov | |
| To: | scientific-linux-errata@fnal.gov | |
| Subject: | Security ERRATA Important: libtiff on SL5.x, SL6.x i386/x86_64 | |
| Date: | Wed, 11 Apr 2012 09:05:37 -0500 | |
| Message-ID: | <201204111405.q3BE5bfS020745@fefmon2.fnal.gov> |
Synopsis: Important: libtiff security update Issue Date: 2012-04-10 CVE Numbers: CVE-2012-1173 The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Two integer overflow flaws, leading to heap-based buffer overflows, were found in the way libtiff attempted to allocate space for a tile in a TIFF image file. An attacker could use these flaws to create a specially-crafted TIFF file that, when opened, would cause an application linked against libtiff to crash or, possibly, execute arbitrary code. (CVE-2012-1173) All libtiff users should upgrade to these updated packages, which contain a backported patch to resolve these issues. All running applications linked against libtiff must be restarted for this update to take effect. SL5: i386 libtiff-3.8.2-14.el5_8.i386.rpm libtiff-debuginfo-3.8.2-14.el5_8.i386.rpm libtiff-devel-3.8.2-14.el5_8.i386.rpm x86_64 libtiff-3.8.2-14.el5_8.i386.rpm libtiff-3.8.2-14.el5_8.x86_64.rpm libtiff-debuginfo-3.8.2-14.el5_8.i386.rpm libtiff-debuginfo-3.8.2-14.el5_8.x86_64.rpm libtiff-devel-3.8.2-14.el5_8.i386.rpm libtiff-devel-3.8.2-14.el5_8.x86_64.rpm SL6: i386 libtiff-3.9.4-5.el6_2.i686.rpm libtiff-debuginfo-3.9.4-5.el6_2.i686.rpm libtiff-devel-3.9.4-5.el6_2.i686.rpm libtiff-static-3.9.4-5.el6_2.i686.rpm x86_64 libtiff-3.9.4-5.el6_2.i686.rpm libtiff-3.9.4-5.el6_2.x86_64.rpm libtiff-debuginfo-3.9.4-5.el6_2.i686.rpm libtiff-debuginfo-3.9.4-5.el6_2.x86_64.rpm libtiff-devel-3.9.4-5.el6_2.i686.rpm libtiff-devel-3.9.4-5.el6_2.x86_64.rpm libtiff-static-3.9.4-5.el6_2.x86_64.rpm - Scientific Linux Development Team