[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1MVuZY-0000WS-CK@titan.mandriva.com>
Date: Tue, 28 Jul 2009 23:51:00 +0200
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2009:169 ] libtiff
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2009:169
http://www.mandriva.com/security/
_______________________________________________________________________
Package : libtiff
Date : July 28, 2009
Affected: Enterprise Server 5.0
_______________________________________________________________________
Problem Description:
Multiple vulnerabilities has been found and corrected in libtiff:
Buffer underflow in the LZWDecodeCompat function in libtiff 3.8.2
allows context-dependent attackers to cause a denial of service (crash)
via a crafted TIFF image, a different vulnerability than CVE-2008-2327
(CVE-2009-2285).
Fix several places in tiff2rgba and rgb2ycbcr that were being careless
about possible integer overflow in calculation of buffer sizes
(CVE-2009-2347).
This update provides fixes for these vulnerabilities.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2285
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2347
_______________________________________________________________________
Updated Packages:
Mandriva Enterprise Server 5:
2bf7a1b4771704f7c72408fe6b944fc0 mes5/i586/libtiff3-3.8.2-12.2mdvmes5.i586.rpm
9b004f438542b42434091ee7f2ff2423 mes5/i586/libtiff3-devel-3.8.2-12.2mdvmes5.i586.rpm
7126e7bace7b14ec2b1f5c42960e0ccd mes5/i586/libtiff3-static-devel-3.8.2-12.2mdvmes5.i586.rpm
ca0f7e4b41bfb512ed4a0d92becb6586 mes5/i586/libtiff-progs-3.8.2-12.2mdvmes5.i586.rpm
53acba6f85576fbfbe2a4a24ab88520f mes5/SRPMS/libtiff-3.8.2-12.2mdvmes5.src.rpm
Mandriva Enterprise Server 5/X86_64:
b20069dd869817ebc68fdc97cf8e4b02 mes5/x86_64/lib64tiff3-3.8.2-12.2mdvmes5.x86_64.rpm
f526910543ec8d419c4b3034a72e9aa3 mes5/x86_64/lib64tiff3-devel-3.8.2-12.2mdvmes5.x86_64.rpm
fe09a51765724e741458509feec0b14a mes5/x86_64/lib64tiff3-static-devel-3.8.2-12.2mdvmes5.x86_64.rpm
5795c86884009e482af8303c28436c04 mes5/x86_64/libtiff-progs-3.8.2-12.2mdvmes5.x86_64.rpm
53acba6f85576fbfbe2a4a24ab88520f mes5/SRPMS/libtiff-3.8.2-12.2mdvmes5.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFKb0iXmqjQ0CJFipgRAvc6AKC9igIrfPUumYiOGgZxZZlTDId62ACg2iRg
C4F/iKStpPgwdTI6Wx49CBw=
=kQyQ
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists