Skip to navigation

Security Advisory Important: libtiff security update

Advisory: RHSA-2010:0520-1
Type: Security Advisory
Severity: Important
Issued on: 2010-07-08
Last updated on: 2010-07-08
Affected Products: Red Hat Desktop (v. 3)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux WS (v. 3)
CVEs (cve.mitre.org): CVE-2010-1411
CVE-2010-2598

Details

Updated libtiff packages that fix two security issues are now available for
Red Hat Enterprise Linux 3.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

The libtiff packages contain a library of functions for manipulating Tagged
Image File Format (TIFF) files.

Multiple integer overflow flaws, leading to a buffer overflow, were
discovered in libtiff. An attacker could use these flaws to create a
specially-crafted TIFF file that, when opened, would cause an application
linked against libtiff to crash or, possibly, execute arbitrary code.
(CVE-2010-1411)

An input validation flaw was discovered in libtiff. An attacker could use
this flaw to create a specially-crafted TIFF file that, when opened, would
cause an application linked against libtiff to crash. (CVE-2010-2598)

Red Hat would like to thank Apple Product Security for responsibly
reporting the CVE-2010-1411 flaw, who credit Kevin Finisterre of
digitalmunition.com for the discovery of the issue.

All libtiff users are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues. All running
applications linked against libtiff must be restarted for this update to
take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Desktop (v. 3)

SRPMS:
ftp://updates.redhat.com/rhn/public/NULL/libtiff/3.5.7-34.el3/SRPMS/libtiff-3.5.7-34.el3.src.rpm
Missing file
    MD5: 9f83ae224076cda7355e0027b8ad3c3a
SHA-256: 92ffb9320c0218b08a3b187f256f943f279fd5885ad67fbb32f08ed4b260badd
 
IA-32:
ftp://updates.redhat.com/rhn/public/NULL/libtiff/3.5.7-34.el3/i386/libtiff-3.5.7-34.el3.i386.rpm
Missing file
    MD5: d38144b67503dd97f5c6c92dfc1d3931
SHA-256: bede7317b095f86fddb9f87277e714b8ff26cd0c1150e4915ba7d5e81e9d8abe
ftp://updates.redhat.com/rhn/public/NULL/libtiff-devel/3.5.7-34.el3/i386/libtiff-devel-3.5.7-34.el3.i386.rpm
Missing file
    MD5: d4e623eb411f3b2c35238804928a6c02
SHA-256: d1b95362b45bac6790a410a881d9ef90191df6b5ba0d1cd2767664b94e260fd5
 
x86_64:
ftp://updates.redhat.com/rhn/public/NULL/libtiff/3.5.7-34.el3/i386/libtiff-3.5.7-34.el3.i386.rpm
Missing file
    MD5: d38144b67503dd97f5c6c92dfc1d3931
SHA-256: bede7317b095f86fddb9f87277e714b8ff26cd0c1150e4915ba7d5e81e9d8abe
ftp://updates.redhat.com/rhn/public/NULL/libtiff/3.5.7-34.el3/x86_64/libtiff-3.5.7-34.el3.x86_64.rpm
Missing file
    MD5: e1231200b796ae70b0d528dc6d436055
SHA-256: d3ee7cd33656f2b0f6dd4adcc602255e612c72e55e071895b8ccab361deee3a6
ftp://updates.redhat.com/rhn/public/NULL/libtiff-devel/3.5.7-34.el3/x86_64/libtiff-devel-3.5.7-34.el3.x86_64.rpm
Missing file
    MD5: b5f4b14ff9293f46bd790c12759b492a
SHA-256: 9bf7b670e5d48c228ac862ea9a65a839ed1ffaf2ac4d57624b68be50300069c7
 
Red Hat Enterprise Linux AS (v. 3)

SRPMS:
ftp://updates.redhat.com/rhn/public/NULL/libtiff/3.5.7-34.el3/SRPMS/libtiff-3.5.7-34.el3.src.rpm
Missing file
    MD5: 9f83ae224076cda7355e0027b8ad3c3a
SHA-256: 92ffb9320c0218b08a3b187f256f943f279fd5885ad67fbb32f08ed4b260badd
 
IA-32:
ftp://updates.redhat.com/rhn/public/NULL/libtiff/3.5.7-34.el3/i386/libtiff-3.5.7-34.el3.i386.rpm
Missing file
    MD5: d38144b67503dd97f5c6c92dfc1d3931
SHA-256: bede7317b095f86fddb9f87277e714b8ff26cd0c1150e4915ba7d5e81e9d8abe
ftp://updates.redhat.com/rhn/public/NULL/libtiff-devel/3.5.7-34.el3/i386/libtiff-devel-3.5.7-34.el3.i386.rpm
Missing file
    MD5: d4e623eb411f3b2c35238804928a6c02
SHA-256: d1b95362b45bac6790a410a881d9ef90191df6b5ba0d1cd2767664b94e260fd5
 
IA-64:
ftp://updates.redhat.com/rhn/public/NULL/libtiff/3.5.7-34.el3/i386/libtiff-3.5.7-34.el3.i386.rpm
Missing file
    MD5: d38144b67503dd97f5c6c92dfc1d3931
SHA-256: bede7317b095f86fddb9f87277e714b8ff26cd0c1150e4915ba7d5e81e9d8abe
ftp://updates.redhat.com/rhn/public/NULL/libtiff/3.5.7-34.el3/ia64/libtiff-3.5.7-34.el3.ia64.rpm
Missing file
    MD5: d98b7ce447bdb25006cf18238530b601
SHA-256: 9d5cb6c134c5af58e5973bed9439accf92265a13b758001919fcda0753e92e8e
ftp://updates.redhat.com/rhn/public/NULL/libtiff-devel/3.5.7-34.el3/ia64/libtiff-devel-3.5.7-34.el3.ia64.rpm
Missing file
    MD5: 90f59c21604313e9b0e6e5ba5ccb951a
SHA-256: 65391f9441f0a94e7e664e13a543770e00d092a716a376f573fd8c954693586c
 
PPC:
ftp://updates.redhat.com/rhn/public/NULL/libtiff/3.5.7-34.el3/ppc/libtiff-3.5.7-34.el3.ppc.rpm
Missing file
    MD5: 28f87f8f299c1949103afecf21fa41a5
SHA-256: 368bf81bf2bbcecec4633c8aed87b4e0a70512526667a2e6c127a73b86914de9
ftp://updates.redhat.com/rhn/public/NULL/libtiff/3.5.7-34.el3/ppc64/libtiff-3.5.7-34.el3.ppc64.rpm
Missing file
    MD5: f29cdab88d5c94fe9838642541759b0c
SHA-256: 6e9b650ad5b7ec85a55debe57f2ab7f67b87332b0f25a67d1bb4883f4bd1c582
ftp://updates.redhat.com/rhn/public/NULL/libtiff-devel/3.5.7-34.el3/ppc/libtiff-devel-3.5.7-34.el3.ppc.rpm
Missing file
    MD5: 13ecf3e1603513ba800ec10c8ef4df26
SHA-256: f08c10a2cc8a9f4b2a1040184ddbbd6cadc07744158b3bb733a1556925990210
 
s390:
ftp://updates.redhat.com/rhn/public/NULL/libtiff/3.5.7-34.el3/s390/libtiff-3.5.7-34.el3.s390.rpm
Missing file
    MD5: 68f901ff1ca1af94a7763ff504852b2b
SHA-256: 6f9ea14342504aa86127163cbcfa724aad8f307e201a8770ee968746d397d2b5
ftp://updates.redhat.com/rhn/public/NULL/libtiff-devel/3.5.7-34.el3/s390/libtiff-devel-3.5.7-34.el3.s390.rpm
Missing file
    MD5: 428cb77b052c0ca8a560be204b43649d
SHA-256: 54e93cf0bb9dd56bfb403a3c018430ab94eba6e47bc34bc9c949c8e335f0d00a
 
s390x:
ftp://updates.redhat.com/rhn/public/NULL/libtiff/3.5.7-34.el3/s390/libtiff-3.5.7-34.el3.s390.rpm
Missing file
    MD5: 68f901ff1ca1af94a7763ff504852b2b
SHA-256: 6f9ea14342504aa86127163cbcfa724aad8f307e201a8770ee968746d397d2b5
ftp://updates.redhat.com/rhn/public/NULL/libtiff/3.5.7-34.el3/s390x/libtiff-3.5.7-34.el3.s390x.rpm
Missing file
    MD5: af41c8b56a1d81a0fbf5925df21ccbc2
SHA-256: 4903ef2a050f918c82e660dd4c66093730351b9608371a01e0c21a2d576ce050
ftp://updates.redhat.com/rhn/public/NULL/libtiff-devel/3.5.7-34.el3/s390x/libtiff-devel-3.5.7-34.el3.s390x.rpm
Missing file
    MD5: be68c343975846dccc8bb2b6cfb0e1d8
SHA-256: 394af4847f40344ca8e094041093c37fef4960e39b1e2d38f337bc8e3d9ab7e2
 
x86_64:
ftp://updates.redhat.com/rhn/public/NULL/libtiff/3.5.7-34.el3/i386/libtiff-3.5.7-34.el3.i386.rpm
Missing file
    MD5: d38144b67503dd97f5c6c92dfc1d3931
SHA-256: bede7317b095f86fddb9f87277e714b8ff26cd0c1150e4915ba7d5e81e9d8abe
ftp://updates.redhat.com/rhn/public/NULL/libtiff/3.5.7-34.el3/x86_64/libtiff-3.5.7-34.el3.x86_64.rpm
Missing file
    MD5: e1231200b796ae70b0d528dc6d436055
SHA-256: d3ee7cd33656f2b0f6dd4adcc602255e612c72e55e071895b8ccab361deee3a6
ftp://updates.redhat.com/rhn/public/NULL/libtiff-devel/3.5.7-34.el3/x86_64/libtiff-devel-3.5.7-34.el3.x86_64.rpm
Missing file
    MD5: b5f4b14ff9293f46bd790c12759b492a
SHA-256: 9bf7b670e5d48c228ac862ea9a65a839ed1ffaf2ac4d57624b68be50300069c7
 
Red Hat Enterprise Linux ES (v. 3)

SRPMS:
ftp://updates.redhat.com/rhn/public/NULL/libtiff/3.5.7-34.el3/SRPMS/libtiff-3.5.7-34.el3.src.rpm
Missing file
    MD5: 9f83ae224076cda7355e0027b8ad3c3a
SHA-256: 92ffb9320c0218b08a3b187f256f943f279fd5885ad67fbb32f08ed4b260badd
 
IA-32:
ftp://updates.redhat.com/rhn/public/NULL/libtiff/3.5.7-34.el3/i386/libtiff-3.5.7-34.el3.i386.rpm
Missing file
    MD5: d38144b67503dd97f5c6c92dfc1d3931
SHA-256: bede7317b095f86fddb9f87277e714b8ff26cd0c1150e4915ba7d5e81e9d8abe
ftp://updates.redhat.com/rhn/public/NULL/libtiff-devel/3.5.7-34.el3/i386/libtiff-devel-3.5.7-34.el3.i386.rpm
Missing file
    MD5: d4e623eb411f3b2c35238804928a6c02
SHA-256: d1b95362b45bac6790a410a881d9ef90191df6b5ba0d1cd2767664b94e260fd5
 
IA-64:
ftp://updates.redhat.com/rhn/public/NULL/libtiff/3.5.7-34.el3/i386/libtiff-3.5.7-34.el3.i386.rpm
Missing file
    MD5: d38144b67503dd97f5c6c92dfc1d3931
SHA-256: bede7317b095f86fddb9f87277e714b8ff26cd0c1150e4915ba7d5e81e9d8abe
ftp://updates.redhat.com/rhn/public/NULL/libtiff/3.5.7-34.el3/ia64/libtiff-3.5.7-34.el3.ia64.rpm
Missing file
    MD5: d98b7ce447bdb25006cf18238530b601
SHA-256: 9d5cb6c134c5af58e5973bed9439accf92265a13b758001919fcda0753e92e8e
ftp://updates.redhat.com/rhn/public/NULL/libtiff-devel/3.5.7-34.el3/ia64/libtiff-devel-3.5.7-34.el3.ia64.rpm
Missing file
    MD5: 90f59c21604313e9b0e6e5ba5ccb951a
SHA-256: 65391f9441f0a94e7e664e13a543770e00d092a716a376f573fd8c954693586c
 
x86_64:
ftp://updates.redhat.com/rhn/public/NULL/libtiff/3.5.7-34.el3/i386/libtiff-3.5.7-34.el3.i386.rpm
Missing file
    MD5: d38144b67503dd97f5c6c92dfc1d3931
SHA-256: bede7317b095f86fddb9f87277e714b8ff26cd0c1150e4915ba7d5e81e9d8abe
ftp://updates.redhat.com/rhn/public/NULL/libtiff/3.5.7-34.el3/x86_64/libtiff-3.5.7-34.el3.x86_64.rpm
Missing file
    MD5: e1231200b796ae70b0d528dc6d436055
SHA-256: d3ee7cd33656f2b0f6dd4adcc602255e612c72e55e071895b8ccab361deee3a6
ftp://updates.redhat.com/rhn/public/NULL/libtiff-devel/3.5.7-34.el3/x86_64/libtiff-devel-3.5.7-34.el3.x86_64.rpm
Missing file
    MD5: b5f4b14ff9293f46bd790c12759b492a
SHA-256: 9bf7b670e5d48c228ac862ea9a65a839ed1ffaf2ac4d57624b68be50300069c7
 
Red Hat Enterprise Linux WS (v. 3)

SRPMS:
ftp://updates.redhat.com/rhn/public/NULL/libtiff/3.5.7-34.el3/SRPMS/libtiff-3.5.7-34.el3.src.rpm
Missing file
    MD5: 9f83ae224076cda7355e0027b8ad3c3a
SHA-256: 92ffb9320c0218b08a3b187f256f943f279fd5885ad67fbb32f08ed4b260badd
 
IA-32:
ftp://updates.redhat.com/rhn/public/NULL/libtiff/3.5.7-34.el3/i386/libtiff-3.5.7-34.el3.i386.rpm
Missing file
    MD5: d38144b67503dd97f5c6c92dfc1d3931
SHA-256: bede7317b095f86fddb9f87277e714b8ff26cd0c1150e4915ba7d5e81e9d8abe
ftp://updates.redhat.com/rhn/public/NULL/libtiff-devel/3.5.7-34.el3/i386/libtiff-devel-3.5.7-34.el3.i386.rpm
Missing file
    MD5: d4e623eb411f3b2c35238804928a6c02
SHA-256: d1b95362b45bac6790a410a881d9ef90191df6b5ba0d1cd2767664b94e260fd5
 
IA-64:
ftp://updates.redhat.com/rhn/public/NULL/libtiff/3.5.7-34.el3/i386/libtiff-3.5.7-34.el3.i386.rpm
Missing file
    MD5: d38144b67503dd97f5c6c92dfc1d3931
SHA-256: bede7317b095f86fddb9f87277e714b8ff26cd0c1150e4915ba7d5e81e9d8abe
ftp://updates.redhat.com/rhn/public/NULL/libtiff/3.5.7-34.el3/ia64/libtiff-3.5.7-34.el3.ia64.rpm
Missing file
    MD5: d98b7ce447bdb25006cf18238530b601
SHA-256: 9d5cb6c134c5af58e5973bed9439accf92265a13b758001919fcda0753e92e8e
ftp://updates.redhat.com/rhn/public/NULL/libtiff-devel/3.5.7-34.el3/ia64/libtiff-devel-3.5.7-34.el3.ia64.rpm
Missing file
    MD5: 90f59c21604313e9b0e6e5ba5ccb951a
SHA-256: 65391f9441f0a94e7e664e13a543770e00d092a716a376f573fd8c954693586c
 
x86_64:
ftp://updates.redhat.com/rhn/public/NULL/libtiff/3.5.7-34.el3/i386/libtiff-3.5.7-34.el3.i386.rpm
Missing file
    MD5: d38144b67503dd97f5c6c92dfc1d3931
SHA-256: bede7317b095f86fddb9f87277e714b8ff26cd0c1150e4915ba7d5e81e9d8abe
ftp://updates.redhat.com/rhn/public/NULL/libtiff/3.5.7-34.el3/x86_64/libtiff-3.5.7-34.el3.x86_64.rpm
Missing file
    MD5: e1231200b796ae70b0d528dc6d436055
SHA-256: d3ee7cd33656f2b0f6dd4adcc602255e612c72e55e071895b8ccab361deee3a6
ftp://updates.redhat.com/rhn/public/NULL/libtiff-devel/3.5.7-34.el3/x86_64/libtiff-devel-3.5.7-34.el3.x86_64.rpm
Missing file
    MD5: b5f4b14ff9293f46bd790c12759b492a
SHA-256: 9bf7b670e5d48c228ac862ea9a65a839ed1ffaf2ac4d57624b68be50300069c7
 

Bugs fixed (see bugzilla for more information)

592361 - CVE-2010-1411 libtiff: integer overflows leading to heap overflow in Fax3SetupState
610786 - CVE-2010-2598 libtiff: crash when reading image with not configured compression


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/