Subject: | |
From: | |
Reply To: | |
Date: | Thu, 3 Mar 2011 14:22:38 -0600 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
Synopsis: Important: libtiff security update
Issue date: 2011-03-02
CVE Names: CVE-2011-0192
A heap-based buffer overflow flaw was found in the way libtiff processed
certain TIFF Internet Fax image files, compressed with the CCITT Group 4
compression algorithm. An attacker could use this flaw to create a
specially-crafted TIFF file that, when opened, would cause an
application linked against libtiff to crash or, possibly, execute
arbitrary code. (CVE-2011-0192)
All running applications linked against libtiff must be restarted for
this update to take effect.
SL 4.x
SRPMS:
libtiff-3.6.1-17.el4.src.rpm
i386:
libtiff-3.6.1-17.el4.i386.rpm
libtiff-devel-3.6.1-17.el4.i386.rpm
x86_64:
libtiff-3.6.1-17.el4.i386.rpm
libtiff-3.6.1-17.el4.x86_64.rpm
libtiff-devel-3.6.1-17.el4.x86_64.rpm
SL 5.x
SRPMS:
libtiff-3.8.2-7.el5_6.6.src.rpm
i386:
libtiff-3.8.2-7.el5_6.6.i386.rpm
libtiff-devel-3.8.2-7.el5_6.6.i386.rpm
x86_64:
libtiff-3.8.2-7.el5_6.6.i386.rpm
libtiff-3.8.2-7.el5_6.6.x86_64.rpm
libtiff-devel-3.8.2-7.el5_6.6.i386.rpm
libtiff-devel-3.8.2-7.el5_6.6.x86_64.rpm
-Connie Sieh
-Troy Dawson
|
|
|