Lucene search

K
centosCentOS ProjectCESA-2011:0392
HistoryMar 31, 2011 - 3:03 p.m.

libtiff security update

2011-03-3115:03:00
CentOS Project
lists.centos.org
49

0.239 Low

EPSS

Percentile

96.6%

CentOS Errata and Security Advisory CESA-2011:0392

The libtiff packages contain a library of functions for manipulating Tagged
Image File Format (TIFF) files.

A heap-based buffer overflow flaw was found in the way libtiff processed
certain TIFF files encoded with a 4-bit run-length encoding scheme from
ThunderScan. An attacker could use this flaw to create a specially-crafted
TIFF file that, when opened, would cause an application linked against
libtiff to crash or, possibly, execute arbitrary code. (CVE-2011-1167)

This update also fixes the following bug:

  • The RHSA-2011:0318 libtiff update introduced a regression that prevented
    certain TIFF Internet Fax image files, compressed with the CCITT Group 4
    compression algorithm, from being read. (BZ#688825)

All libtiff users should upgrade to these updated packages, which contain a
backported patch to resolve these issues. All running applications linked
against libtiff must be restarted for this update to take effect.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2011-April/079525.html
https://lists.centos.org/pipermail/centos-announce/2011-April/079526.html
https://lists.centos.org/pipermail/centos-announce/2011-March/079439.html

Affected packages:
libtiff
libtiff-devel

Upstream details at:
https://access.redhat.com/errata/RHSA-2011:0392