Synopsis: Important: libtiff security update
Issue Date: 2011-03-02
CVE Numbers: CVE-2011-0192
—
The libtiff packages contain a library of functions for manipulating Tagged
Image File Format (TIFF) files.
A heap-based buffer overflow flaw was found in the way libtiff processed
certain TIFF Internet Fax image files, compressed with the CCITT Group 4
compression algorithm. An attacker could use this flaw to create a
specially-crafted TIFF file that, when opened, would cause an application
linked against libtiff to crash or, possibly, execute arbitrary code.
(CVE-2011-0192)
Red Hat would like to thank Apple Product Security for reporting this
issue.
All libtiff users should upgrade to these updated packages, which contain a
backported patch to resolve this issue. All running applications linked
against libtiff must be restarted for this update to take effect.
—
SL4
x86_64
libtiff-3.6.1-17.el4.i386.rpm
libtiff-3.6.1-17.el4.x86_64.rpm
libtiff-devel-3.6.1-17.el4.x86_64.rpm
i386
libtiff-3.6.1-17.el4.i386.rpm
libtiff-devel-3.6.1-17.el4.i386.rpm
SL5
x86_64
libtiff-3.8.2-7.el5_6.6.i386.rpm
libtiff-3.8.2-7.el5_6.6.x86_64.rpm
libtiff-devel-3.8.2-7.el5_6.6.i386.rpm
libtiff-devel-3.8.2-7.el5_6.6.x86_64.rpm
i386
libtiff-3.8.2-7.el5_6.6.i386.rpm
libtiff-devel-3.8.2-7.el5_6.6.i386.rpm
SL6
x86_64
libtiff-3.9.4-1.el6_0.1.i686.rpm
libtiff-3.9.4-1.el6_0.1.x86_64.rpm
libtiff-devel-3.9.4-1.el6_0.1.i686.rpm
libtiff-devel-3.9.4-1.el6_0.1.x86_64.rpm
libtiff-static-3.9.4-1.el6_0.1.x86_64.rpm
i386
libtiff-3.9.4-1.el6_0.1.i686.rpm
libtiff-devel-3.9.4-1.el6_0.1.i686.rpm
libtiff-static-3.9.4-1.el6_0.1.i686.rpm
– Scientific Linux Development Team