TITLE: Fedora update for libtiff SECUNIA ADVISORY ID: SA19851 VERIFY ADVISORY: http://secunia.com/advisories/19851/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Fedora Core 5 http://secunia.com/product/8808/ Fedora Core 4 http://secunia.com/product/5251/ DESCRIPTION: Fedora has issued an update for libtiff. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. For more information: SA19838 SOLUTION: Apply updated packages. Fedora Core 5: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/ f10f9f02eeed876e595757f26b7001f89d429acd SRPMS/libtiff-3.7.4-4.src.rpm 63df5887d2e5eef6e5825c31becdd2a3fd4ac331 ppc/libtiff-3.7.4-4.ppc.rpm 1c918c481ba1424d23487481a1746ce2e2a351cc ppc/libtiff-devel-3.7.4-4.ppc.rpm 64536d586ab9b70544b3030e4ca7cd0cfbd92408 ppc/debug/libtiff-debuginfo-3.7.4-4.ppc.rpm e67065b4eff65172ea28cb52fcb74dc8a51f9e9d x86_64/libtiff-3.7.4-4.x86_64.rpm 0a96584fb47408728abc6f0c4856f4eb22f90f96 x86_64/libtiff-devel-3.7.4-4.x86_64.rpm c6816dcc190d212a929ca208e4dd09a9ae384062 x86_64/debug/libtiff-debuginfo-3.7.4-4.x86_64.rpm 10a8510cf5b10ca29df0d046bc41ca551b87828d i386/libtiff-3.7.4-4.i386.rpm 1e9d034a1331234afeed76134b9eef4bc4f00f8b i386/libtiff-devel-3.7.4-4.i386.rpm c9d13d1a6523a044393f97daff65653888a0c046 i386/debug/libtiff-debuginfo-3.7.4-4.i386.rpm Fedora Core 4: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/ fc85fc083881e06fdeece647aeb98a2e9b2f7952 SRPMS/libtiff-3.7.1-6.fc4.1.src.rpm e2db5abb2efd165434e20d29b99154c37566edf6 ppc/libtiff-3.7.1-6.fc4.1.ppc.rpm 74b40fd554620c1aa5d9b4920761fccbdc8f2bb6 ppc/libtiff-devel-3.7.1-6.fc4.1.ppc.rpm 0f1fcc2bb8973859cc8e00a4900ea82782f63c1c ppc/debug/libtiff-debuginfo-3.7.1-6.fc4.1.ppc.rpm 63321e57b0445da06864815c675eb6d2eef7c3bc x86_64/libtiff-3.7.1-6.fc4.1.x86_64.rpm 2c96cf3bfb814830e6f3fc8ac573a3b90732b653 x86_64/libtiff-devel-3.7.1-6.fc4.1.x86_64.rpm 94968b95b8798b173a23ba6b7b449b213195a20a x86_64/debug/libtiff-debuginfo-3.7.1-6.fc4.1.x86_64.rpm 6c362bcbc13becdd3cb7a91ecd272bd260564d04 i386/libtiff-3.7.1-6.fc4.1.i386.rpm 6a89ec5b0e4a6945ebef4f2a0c310f3f5104964b i386/libtiff-devel-3.7.1-6.fc4.1.i386.rpm b2f21b90d05b9b508213e7461185098cb1adcba0 i386/debug/libtiff-debuginfo-3.7.1-6.fc4.1.i386.rpm OTHER REFERENCES: SA19838: http://secunia.com/advisories/19838/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------