From Mageia wiki
Jump to: navigation, search

MGASA-2012-0332

Date: November 17th, 2012
Affected releases: 1, 2


Description:
Updated libtiff packages fix security vulnerability:

ppm2tiff does not check the return value of the TIFFScanlineSize function,
which allows remote attackers to cause a denial of service (crash) and
possibly execute arbitrary code via a crafted PPM image that triggers an
integer overflow, a zero-memory allocation, and a heap-based buffer overflow
(CVE-2012-4564).


Updated Packages:
Mageia 1:
lib(64)tiff3-3.9.5-1.7.mga1
lib(64)tiff-devel-3.9.5-1.7.mga1
lib(64)tiff-static-devel-3.9.5-1.7.mga1
libtiff-progs-3.9.5-1.7.mga1

Mageia 2:
lib(64)tiff5-4.0.1-2.4.mga2
lib(64)tiff-devel-4.0.1-2.4.mga2
lib(64)tiff-static-devel-4.0.1-2.4.mga2
libtiff-progs-4.0.1-2.4.mga2


References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4564
http://www.ubuntu.com/usn/usn-1631-1/
https://bugs.mageia.org/show_bug.cgi?id=8087