Uočena su i ispravljena dva sigurnosna propusta programskog alata libtiff, namijenjenog za operacijski sustav Fedora 14. Riječ je o biblioteci funkcija za upravljanje slikama pohranjenim u TIFF (eng. Tagged Image File Format) formatu. Propusti su vezani uz libtiff modul za "thunder" dekoder te "Fax4Decode". U oba slučaja moguće je izazvati preljev međuspremnika. Tu činjenicu udaljeni napadač može iskoristiti za pokretanje napada uskraćivanja usluga na aplikacijama koje koriste biblioteku libtiff. Drugi je mogući napad izvršavanje proizvoljnog, zlonamjernog koda s ovlastima korisnika aplikacije. Svim korisnicima savjetuje se nadogradnja na najnoviju inačicu biblioteke.

--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-3836
2011-03-22 18:30:33
--------------------------------------------------------------------------------

Name        : libtiff
Product     : Fedora 14
Version     : 3.9.4
Release     : 4.fc14
URL         : http://www.remotesensing.org/libtiff/
Summary     : Library of functions for manipulating TIFF format image files
Description :
The libtiff package contains a library of functions for manipulating
TIFF (Tagged Image File Format) image format files.  TIFF is a widely
used file format for bitmapped images.  TIFF files usually end in the
.tif extension and they are often quite large.

The libtiff package should be installed if you need to manipulate TIFF
format image files.

--------------------------------------------------------------------------------
Update Information:

Fix incorrect fix for CVE-2011-0192

Add fix for CVE-2011-1167
Fix buffer overrun in fax decoding (CVE-2011-0192) as well as a
non-security-critical crash in gif2tiff.
--------------------------------------------------------------------------------
ChangeLog:

* Mon Mar 21 2011 Tom Lane <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 3.9.4-4
- Fix incorrect fix for CVE-2011-0192
Resolves: #684007
Related: #688825
- Add fix for CVE-2011-1167
Resolves: #689574
* Wed Mar  2 2011 Tom Lane <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 3.9.4-3
- Add patch for CVE-2011-0192
Resolves: #681672
- Fix non-security-critical potential SIGSEGV in gif2tiff
Related: #648820
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #684939 - CVE-2011-1167 libtiff: heap-based buffer overflow in
thunder decoder (ZDI-11-107)
        https://bugzilla.redhat.com/show_bug.cgi?id=684939
  [ 2 ] Bug #678635 - CVE-2011-0192 libtiff: buffer overflow in Fax4Decode
        https://bugzilla.redhat.com/show_bug.cgi?id=678635
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update libtiff' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce

Idi na vrh