-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
- --------------------------------------------------------------------- Red Hat Security Advisory
Synopsis: Important: libtiff security update Advisory ID: RHSA-2006:0425-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0425.html Issue date: 2006-05-09 Updated on: 2006-05-09 Product: Red Hat Enterprise Linux CVE Names: CVE-2006-2024 CVE-2006-2025 CVE-2006-2026 CVE-2006-2120 - ---------------------------------------------------------------------
1. Summary:
Updated libtiff packages that fix several security flaws are now available for Red Hat Enterprise Linux.
This update has been rated as having important security impact by the Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
3. Problem description:
The libtiff package contains a library of functions for manipulating TIFF (Tagged Image File Format) image format files.
An integer overflow flaw was discovered in libtiff. An attacker could create a carefully crafted TIFF file in such a way that it could cause an application linked with libtiff to crash or possibly execute arbitrary code. (CVE-2006-2025)
A double free flaw was discovered in libtiff. An attacker could create a carefully crafted TIFF file in such a way that it could cause an application linked with libtiff to crash or possibly execute arbitrary code. (CVE-2006-2026)
Several denial of service flaws were discovered in libtiff. An attacker could create a carefully crafted TIFF file in such a way that it could cause an application linked with libtiff to crash. (CVE-2006-2024, CVE-2006-2120)
All users are advised to upgrade to these updated packages, which contain backported fixes for these issues.
4. Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/):
189933 - CVE-2006-2024 multiple libtiff issues (CVE-2006-2025, CVE-2006-2026) 189974 - CVE-2006-2120 libtiff DoS
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS: libtiff-3.5.7-30.el2.1.src.rpm 87e92d44fcc7ce77758132833ad900cb libtiff-3.5.7-30.el2.1.src.rpm
i386: f551309d6c28a7116a54634908d57f9d libtiff-3.5.7-30.el2.1.i386.rpm 64aa285808fcd3e1d5e52e9c9c84e712 libtiff-devel-3.5.7-30.el2.1.i386.rpm
ia64: 9274af2e436ec05555f326fc02293756 libtiff-3.5.7-30.el2.1.ia64.rpm 93f02f4b82ab1e9a7d1e088cefc6bf82 libtiff-devel-3.5.7-30.el2.1.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS: libtiff-3.5.7-30.el2.1.src.rpm 87e92d44fcc7ce77758132833ad900cb libtiff-3.5.7-30.el2.1.src.rpm
ia64: 9274af2e436ec05555f326fc02293756 libtiff-3.5.7-30.el2.1.ia64.rpm 93f02f4b82ab1e9a7d1e088cefc6bf82 libtiff-devel-3.5.7-30.el2.1.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS: libtiff-3.5.7-30.el2.1.src.rpm 87e92d44fcc7ce77758132833ad900cb libtiff-3.5.7-30.el2.1.src.rpm
i386: f551309d6c28a7116a54634908d57f9d libtiff-3.5.7-30.el2.1.i386.rpm 64aa285808fcd3e1d5e52e9c9c84e712 libtiff-devel-3.5.7-30.el2.1.i386.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS: libtiff-3.5.7-30.el2.1.src.rpm 87e92d44fcc7ce77758132833ad900cb libtiff-3.5.7-30.el2.1.src.rpm
i386: f551309d6c28a7116a54634908d57f9d libtiff-3.5.7-30.el2.1.i386.rpm 64aa285808fcd3e1d5e52e9c9c84e712 libtiff-devel-3.5.7-30.el2.1.i386.rpm
Red Hat Enterprise Linux AS version 3:
SRPMS: libtiff-3.5.7-25.el3.1.src.rpm 1490807b5d6fbda4ee076ea8f5680fee libtiff-3.5.7-25.el3.1.src.rpm
i386: 24db138a653e9c931fab2f6e78450c6f libtiff-3.5.7-25.el3.1.i386.rpm 69f0ef53cb8be5d239048d4b5579b4ca libtiff-debuginfo-3.5.7-25.el3.1.i386.rpm cfaef3999623396ab3024ebe7e38335b libtiff-devel-3.5.7-25.el3.1.i386.rpm
ia64: 24db138a653e9c931fab2f6e78450c6f libtiff-3.5.7-25.el3.1.i386.rpm dcd1eae2ccb0544c5c63643ef51be812 libtiff-3.5.7-25.el3.1.ia64.rpm 69f0ef53cb8be5d239048d4b5579b4ca libtiff-debuginfo-3.5.7-25.el3.1.i386.rpm 009d841f6c5a1e5046e4311b85c294e5 libtiff-debuginfo-3.5.7-25.el3.1.ia64.rpm 091a246db5120a322b0bf562d0b44142 libtiff-devel-3.5.7-25.el3.1.ia64.rpm
ppc: 08d9bfb07060faabdc1eaf9f85557fd9 libtiff-3.5.7-25.el3.1.ppc.rpm 9b6467e3e2ccc62833c17c103e94b3c9 libtiff-3.5.7-25.el3.1.ppc64.rpm d582d2d6d0b59f5b28363dfe91291783 libtiff-debuginfo-3.5.7-25.el3.1.ppc.rpm 19e0c2648b78f3d2f3a9842a9f709d16 libtiff-debuginfo-3.5.7-25.el3.1.ppc64.rpm e0b1e68eb2f3cf750ac5d690705735ea libtiff-devel-3.5.7-25.el3.1.ppc.rpm
s390: b0c32ff31e6d57030137ceea7d62eb6b libtiff-3.5.7-25.el3.1.s390.rpm 8721bf72383f716eee0bc9f358dbe0ba libtiff-debuginfo-3.5.7-25.el3.1.s390.rpm 268f9aceccf4f4436f5b84253abbf340 libtiff-devel-3.5.7-25.el3.1.s390.rpm
s390x: b0c32ff31e6d57030137ceea7d62eb6b libtiff-3.5.7-25.el3.1.s390.rpm 108dbc6bc9a7c923ec735c64bc52ec71 libtiff-3.5.7-25.el3.1.s390x.rpm 8721bf72383f716eee0bc9f358dbe0ba libtiff-debuginfo-3.5.7-25.el3.1.s390.rpm 1c43093853dca5f9edbfb15ec8257a66 libtiff-debuginfo-3.5.7-25.el3.1.s390x.rpm a35d361c5b96ecb2fd13d0455294d18a libtiff-devel-3.5.7-25.el3.1.s390x.rpm
x86_64: 24db138a653e9c931fab2f6e78450c6f libtiff-3.5.7-25.el3.1.i386.rpm 7f9c8bb211fbdb36a0d45f80b4ba3a91 libtiff-3.5.7-25.el3.1.x86_64.rpm 69f0ef53cb8be5d239048d4b5579b4ca libtiff-debuginfo-3.5.7-25.el3.1.i386.rpm 8943e4cfb09742e58c1b407b74b59ddb libtiff-debuginfo-3.5.7-25.el3.1.x86_64.rpm 26133072ae5ea80696b2fdf5241c3d99 libtiff-devel-3.5.7-25.el3.1.x86_64.rpm
Red Hat Desktop version 3:
SRPMS: libtiff-3.5.7-25.el3.1.src.rpm 1490807b5d6fbda4ee076ea8f5680fee libtiff-3.5.7-25.el3.1.src.rpm
i386: 24db138a653e9c931fab2f6e78450c6f libtiff-3.5.7-25.el3.1.i386.rpm 69f0ef53cb8be5d239048d4b5579b4ca libtiff-debuginfo-3.5.7-25.el3.1.i386.rpm cfaef3999623396ab3024ebe7e38335b libtiff-devel-3.5.7-25.el3.1.i386.rpm
x86_64: 24db138a653e9c931fab2f6e78450c6f libtiff-3.5.7-25.el3.1.i386.rpm 7f9c8bb211fbdb36a0d45f80b4ba3a91 libtiff-3.5.7-25.el3.1.x86_64.rpm 69f0ef53cb8be5d239048d4b5579b4ca libtiff-debuginfo-3.5.7-25.el3.1.i386.rpm 8943e4cfb09742e58c1b407b74b59ddb libtiff-debuginfo-3.5.7-25.el3.1.x86_64.rpm 26133072ae5ea80696b2fdf5241c3d99 libtiff-devel-3.5.7-25.el3.1.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
SRPMS: libtiff-3.5.7-25.el3.1.src.rpm 1490807b5d6fbda4ee076ea8f5680fee libtiff-3.5.7-25.el3.1.src.rpm
i386: 24db138a653e9c931fab2f6e78450c6f libtiff-3.5.7-25.el3.1.i386.rpm 69f0ef53cb8be5d239048d4b5579b4ca libtiff-debuginfo-3.5.7-25.el3.1.i386.rpm cfaef3999623396ab3024ebe7e38335b libtiff-devel-3.5.7-25.el3.1.i386.rpm
ia64: 24db138a653e9c931fab2f6e78450c6f libtiff-3.5.7-25.el3.1.i386.rpm dcd1eae2ccb0544c5c63643ef51be812 libtiff-3.5.7-25.el3.1.ia64.rpm 69f0ef53cb8be5d239048d4b5579b4ca libtiff-debuginfo-3.5.7-25.el3.1.i386.rpm 009d841f6c5a1e5046e4311b85c294e5 libtiff-debuginfo-3.5.7-25.el3.1.ia64.rpm 091a246db5120a322b0bf562d0b44142 libtiff-devel-3.5.7-25.el3.1.ia64.rpm
x86_64: 24db138a653e9c931fab2f6e78450c6f libtiff-3.5.7-25.el3.1.i386.rpm 7f9c8bb211fbdb36a0d45f80b4ba3a91 libtiff-3.5.7-25.el3.1.x86_64.rpm 69f0ef53cb8be5d239048d4b5579b4ca libtiff-debuginfo-3.5.7-25.el3.1.i386.rpm 8943e4cfb09742e58c1b407b74b59ddb libtiff-debuginfo-3.5.7-25.el3.1.x86_64.rpm 26133072ae5ea80696b2fdf5241c3d99 libtiff-devel-3.5.7-25.el3.1.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
SRPMS: libtiff-3.5.7-25.el3.1.src.rpm 1490807b5d6fbda4ee076ea8f5680fee libtiff-3.5.7-25.el3.1.src.rpm
i386: 24db138a653e9c931fab2f6e78450c6f libtiff-3.5.7-25.el3.1.i386.rpm 69f0ef53cb8be5d239048d4b5579b4ca libtiff-debuginfo-3.5.7-25.el3.1.i386.rpm cfaef3999623396ab3024ebe7e38335b libtiff-devel-3.5.7-25.el3.1.i386.rpm
ia64: 24db138a653e9c931fab2f6e78450c6f libtiff-3.5.7-25.el3.1.i386.rpm dcd1eae2ccb0544c5c63643ef51be812 libtiff-3.5.7-25.el3.1.ia64.rpm 69f0ef53cb8be5d239048d4b5579b4ca libtiff-debuginfo-3.5.7-25.el3.1.i386.rpm 009d841f6c5a1e5046e4311b85c294e5 libtiff-debuginfo-3.5.7-25.el3.1.ia64.rpm 091a246db5120a322b0bf562d0b44142 libtiff-devel-3.5.7-25.el3.1.ia64.rpm
x86_64: 24db138a653e9c931fab2f6e78450c6f libtiff-3.5.7-25.el3.1.i386.rpm 7f9c8bb211fbdb36a0d45f80b4ba3a91 libtiff-3.5.7-25.el3.1.x86_64.rpm 69f0ef53cb8be5d239048d4b5579b4ca libtiff-debuginfo-3.5.7-25.el3.1.i386.rpm 8943e4cfb09742e58c1b407b74b59ddb libtiff-debuginfo-3.5.7-25.el3.1.x86_64.rpm 26133072ae5ea80696b2fdf5241c3d99 libtiff-devel-3.5.7-25.el3.1.x86_64.rpm
Red Hat Enterprise Linux AS version 4:
SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/libtiff-3.6.1-10.src.rpm f187e5faa4a9e9217decb8226ab1f320 libtiff-3.6.1-10.src.rpm
i386: 7ed5bd7e2376a403e733737ca8f258ab libtiff-3.6.1-10.i386.rpm 6cce9331ad86b9d581da80763dcee1d4 libtiff-debuginfo-3.6.1-10.i386.rpm 65b8fe42255d336352887a472a5fb029 libtiff-devel-3.6.1-10.i386.rpm
ia64: 7ed5bd7e2376a403e733737ca8f258ab libtiff-3.6.1-10.i386.rpm 7c3512460660ced6b5c37cc824bf4f8c libtiff-3.6.1-10.ia64.rpm 6cce9331ad86b9d581da80763dcee1d4 libtiff-debuginfo-3.6.1-10.i386.rpm 66651e14ff0bbdfdb7f6ad0e3034adae libtiff-debuginfo-3.6.1-10.ia64.rpm fe810c4f0117fff2a78dd12102e0fc5f libtiff-devel-3.6.1-10.ia64.rpm
ppc: 689acd25b3a5e061cfeba66ec7e4bb6b libtiff-3.6.1-10.ppc.rpm 832b748b65e89e395e67a371a4853190 libtiff-3.6.1-10.ppc64.rpm 7a24660f5978fe5cd56911af48eeae09 libtiff-debuginfo-3.6.1-10.ppc.rpm 6d50f111a08a8bf8119b2b8ea55a1d42 libtiff-debuginfo-3.6.1-10.ppc64.rpm 11f03497cc931183e82b9ad134e6014d libtiff-devel-3.6.1-10.ppc.rpm
s390: e673fb7053252c168b2b107181c466c8 libtiff-3.6.1-10.s390.rpm a70efd91702f6d8232ed364e811a55f1 libtiff-debuginfo-3.6.1-10.s390.rpm 2df1d55c020d38bbd9c7ffbbf5673404 libtiff-devel-3.6.1-10.s390.rpm
s390x: e673fb7053252c168b2b107181c466c8 libtiff-3.6.1-10.s390.rpm 241d95f0cdb88ef26399bc7e6d5af764 libtiff-3.6.1-10.s390x.rpm a70efd91702f6d8232ed364e811a55f1 libtiff-debuginfo-3.6.1-10.s390.rpm 469a968faf3b7bf3f2d078ae2b5ac89a libtiff-debuginfo-3.6.1-10.s390x.rpm 03901241d37afb1c38835838076b34c1 libtiff-devel-3.6.1-10.s390x.rpm
x86_64: 7ed5bd7e2376a403e733737ca8f258ab libtiff-3.6.1-10.i386.rpm e390b83c9f71ffedab52f7e53fe09827 libtiff-3.6.1-10.x86_64.rpm 6cce9331ad86b9d581da80763dcee1d4 libtiff-debuginfo-3.6.1-10.i386.rpm 822c2954bd85ba2d835b9944a8a02fb1 libtiff-debuginfo-3.6.1-10.x86_64.rpm 562f7e95d243e4d69cbe123eb14bf947 libtiff-devel-3.6.1-10.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS: libtiff-3.6.1-10.src.rpm f187e5faa4a9e9217decb8226ab1f320 libtiff-3.6.1-10.src.rpm
i386: 7ed5bd7e2376a403e733737ca8f258ab libtiff-3.6.1-10.i386.rpm 6cce9331ad86b9d581da80763dcee1d4 libtiff-debuginfo-3.6.1-10.i386.rpm 65b8fe42255d336352887a472a5fb029 libtiff-devel-3.6.1-10.i386.rpm
x86_64: 7ed5bd7e2376a403e733737ca8f258ab libtiff-3.6.1-10.i386.rpm e390b83c9f71ffedab52f7e53fe09827 libtiff-3.6.1-10.x86_64.rpm 6cce9331ad86b9d581da80763dcee1d4 libtiff-debuginfo-3.6.1-10.i386.rpm 822c2954bd85ba2d835b9944a8a02fb1 libtiff-debuginfo-3.6.1-10.x86_64.rpm 562f7e95d243e4d69cbe123eb14bf947 libtiff-devel-3.6.1-10.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/libtiff-3.6.1-10.src.rpm f187e5faa4a9e9217decb8226ab1f320 libtiff-3.6.1-10.src.rpm
i386: 7ed5bd7e2376a403e733737ca8f258ab libtiff-3.6.1-10.i386.rpm 6cce9331ad86b9d581da80763dcee1d4 libtiff-debuginfo-3.6.1-10.i386.rpm 65b8fe42255d336352887a472a5fb029 libtiff-devel-3.6.1-10.i386.rpm
ia64: 7ed5bd7e2376a403e733737ca8f258ab libtiff-3.6.1-10.i386.rpm 7c3512460660ced6b5c37cc824bf4f8c libtiff-3.6.1-10.ia64.rpm 6cce9331ad86b9d581da80763dcee1d4 libtiff-debuginfo-3.6.1-10.i386.rpm 66651e14ff0bbdfdb7f6ad0e3034adae libtiff-debuginfo-3.6.1-10.ia64.rpm fe810c4f0117fff2a78dd12102e0fc5f libtiff-devel-3.6.1-10.ia64.rpm
x86_64: 7ed5bd7e2376a403e733737ca8f258ab libtiff-3.6.1-10.i386.rpm e390b83c9f71ffedab52f7e53fe09827 libtiff-3.6.1-10.x86_64.rpm 6cce9331ad86b9d581da80763dcee1d4 libtiff-debuginfo-3.6.1-10.i386.rpm 822c2954bd85ba2d835b9944a8a02fb1 libtiff-debuginfo-3.6.1-10.x86_64.rpm 562f7e95d243e4d69cbe123eb14bf947 libtiff-devel-3.6.1-10.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/libtiff-3.6.1-10.src.rpm f187e5faa4a9e9217decb8226ab1f320 libtiff-3.6.1-10.src.rpm
i386: 7ed5bd7e2376a403e733737ca8f258ab libtiff-3.6.1-10.i386.rpm 6cce9331ad86b9d581da80763dcee1d4 libtiff-debuginfo-3.6.1-10.i386.rpm 65b8fe42255d336352887a472a5fb029 libtiff-devel-3.6.1-10.i386.rpm
ia64: 7ed5bd7e2376a403e733737ca8f258ab libtiff-3.6.1-10.i386.rpm 7c3512460660ced6b5c37cc824bf4f8c libtiff-3.6.1-10.ia64.rpm 6cce9331ad86b9d581da80763dcee1d4 libtiff-debuginfo-3.6.1-10.i386.rpm 66651e14ff0bbdfdb7f6ad0e3034adae libtiff-debuginfo-3.6.1-10.ia64.rpm fe810c4f0117fff2a78dd12102e0fc5f libtiff-devel-3.6.1-10.ia64.rpm
x86_64: 7ed5bd7e2376a403e733737ca8f258ab libtiff-3.6.1-10.i386.rpm e390b83c9f71ffedab52f7e53fe09827 libtiff-3.6.1-10.x86_64.rpm 6cce9331ad86b9d581da80763dcee1d4 libtiff-debuginfo-3.6.1-10.i386.rpm 822c2954bd85ba2d835b9944a8a02fb1 libtiff-debuginfo-3.6.1-10.x86_64.rpm 562f7e95d243e4d69cbe123eb14bf947 libtiff-devel-3.6.1-10.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2024 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2025 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2026 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2120 http://www.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/
Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)
iD8DBQFEYIFWXlSAg2UNWIIRAmKaAJ9pWE9nHpJv646a+Wl2cdeUsGgNQwCgvAB3 XzeVkQ8GLdZpX36NANITNa4= =Dj1S -----END PGP SIGNATURE-----
-- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-list
|