Utvrđen je i otklonjen sigurnosni nedostatak programske biblioteke libtiff. Spomenuti propust udaljeni napadač može iskoristiti za izvođenje DoS napada ili pokretanje proizvoljnog programskog koda.
Propust je posljedica preljeva međuspremnika do kojeg dolazi pri zapisivanju sadržaja TIFF slike u određenu PDF datoteku kada je pokazivač na T2P strukturu nepravilno inicijaliziran.
Posljedica:
Propust je moguće iskoristiti za izvršavanje proizvoljnog programskog koda ili izvođenje napada uskraćivanjem usluge.
Rješenje:
Korisnicima se savjetuje prelazak na ispravljenu inačicu.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-11000
2012-07-23 19:52:32
--------------------------------------------------------------------------------
Name : libtiff
Product : Fedora 17
Version : 3.9.6
Release : 2.fc17
URL : http://www.remotesensing.org/libtiff/
Summary : Library of functions for manipulating TIFF format image files
Description :
The libtiff package contains a library of functions for manipulating
TIFF (Tagged Image File Format) image format files. TIFF is a widely
used file format for bitmapped images. TIFF files usually end in the
.tif extension and they are often quite large.
The libtiff package should be installed if you need to manipulate TIFF
format image files.
--------------------------------------------------------------------------------
Update Information:
Fix security bug in tiff2pdf, CVE-2012-3401
--------------------------------------------------------------------------------
ChangeLog:
* Sun Jul 22 2012 Tom Lane <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 3.9.6-2
- Add patch for CVE-2012-3401
Resolves: #841736
* Thu Jun 28 2012 Tom Lane <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 3.9.6-1
- Update to libtiff 3.9.6, and add patches for CVE-2012-2088, CVE-2012-2113
Resolves: #832866
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #837577 - CVE-2012-3401 libtiff (tiff2pdf): Heap-based buffer
overflow due to improper initialization of T2P context struct pointer
https://bugzilla.redhat.com/show_bug.cgi?id=837577
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update libtiff' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke