A new update is available for Red Hat Enterprise Linux. Here the announcement:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ---------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Moderate: libexif security update
Advisory ID: RHSA-2007:1165-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-1165.html
Issue date: 2007-12-19
Updated on: 2007-12-19
Product: Red Hat Enterprise Linux
CVE Names: CVE-2007-6351 CVE-2007-6352
- ---------------------------------------------------------------------
1. Summary:
Updated libexif packages that fix several security issues are now available
for Red Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64
3. Problem description:
The libexif packages contain the Exif library. Exif is an image file format
specification that enables metadata tags to be added to existing JPEG, TIFF
and RIFF files. The Exif library makes it possible to parse an Exif file
and read this metadata.
An infinite recursion flaw was found in the way libexif parses Exif image
tags. If a victim opens a carefully crafted Exif image file, it could cause
the application linked against libexif to crash. (CVE-2007-6351)
An integer overflow flaw was found in the way libexif parses Exif image
tags. If a victim opens a carefully crafted Exif image file, it could cause
the application linked against libexif to execute arbitrary code, or crash.
(CVE-2007-6352)
Users of libexif are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues.
4. Solution:
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
5. Bug IDs fixed (http://bugzilla.redhat.com/):
425551 - CVE-2007-6351 libexif infinite recursion flaw (DoS)
425561 - CVE-2007-6352 libexif integer overflow
6. RPMs required:
Red Hat Enterprise Linux Desktop (v. 5 client):
SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/libexif-0.6.13-4.0.2.el5_1.1.src.rpm
405b067a3ff329fd2f73b4edfd767837 libexif-0.6.13-4.0.2.el5_1.1.src.rpm
i386:
5f5e2fdebf5c7aeb88c4d25ce887edf3 libexif-0.6.13-4.0.2.el5_1.1.i386.rpm
2ec8f0b6652c4c55b3923d2e319a6ec1 libexif-debuginfo-0.6.13-4.0.2.el5_1.1.i386.rpm
x86_64:
5f5e2fdebf5c7aeb88c4d25ce887edf3 libexif-0.6.13-4.0.2.el5_1.1.i386.rpm
91d485dd3c59491db18592d70a25a59a libexif-0.6.13-4.0.2.el5_1.1.x86_64.rpm
2ec8f0b6652c4c55b3923d2e319a6ec1 libexif-debuginfo-0.6.13-4.0.2.el5_1.1.i386.rpm
0a1a7b23c17e3dddb66022e1a039cebd libexif-debuginfo-0.6.13-4.0.2.el5_1.1.x86_64.rpm
RHEL Desktop Workstation (v. 5 client):
SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/libexif-0.6.13-4.0.2.el5_1.1.src.rpm
405b067a3ff329fd2f73b4edfd767837 libexif-0.6.13-4.0.2.el5_1.1.src.rpm
i386:
2ec8f0b6652c4c55b3923d2e319a6ec1 libexif-debuginfo-0.6.13-4.0.2.el5_1.1.i386.rpm
eccd0c4354faa72f1aac98e074c53b4e libexif-devel-0.6.13-4.0.2.el5_1.1.i386.rpm
x86_64:
2ec8f0b6652c4c55b3923d2e319a6ec1 libexif-debuginfo-0.6.13-4.0.2.el5_1.1.i386.rpm
0a1a7b23c17e3dddb66022e1a039cebd libexif-debuginfo-0.6.13-4.0.2.el5_1.1.x86_64.rpm
eccd0c4354faa72f1aac98e074c53b4e libexif-devel-0.6.13-4.0.2.el5_1.1.i386.rpm
a4cd77aa35f9c6e302399e094ca66fef libexif-devel-0.6.13-4.0.2.el5_1.1.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/libexif-0.6.13-4.0.2.el5_1.1.src.rpm
405b067a3ff329fd2f73b4edfd767837 libexif-0.6.13-4.0.2.el5_1.1.src.rpm
i386:
5f5e2fdebf5c7aeb88c4d25ce887edf3 libexif-0.6.13-4.0.2.el5_1.1.i386.rpm
2ec8f0b6652c4c55b3923d2e319a6ec1 libexif-debuginfo-0.6.13-4.0.2.el5_1.1.i386.rpm
eccd0c4354faa72f1aac98e074c53b4e libexif-devel-0.6.13-4.0.2.el5_1.1.i386.rpm
ia64:
d82e96851e21bad167757e92e702904f libexif-0.6.13-4.0.2.el5_1.1.ia64.rpm
30b855e223e1dfd41e8eb7e47bf8944b libexif-debuginfo-0.6.13-4.0.2.el5_1.1.ia64.rpm
5e4041135eab0541826dd5332c2114a3 libexif-devel-0.6.13-4.0.2.el5_1.1.ia64.rpm
ppc:
1045dc0f0638a436e5fb27d46a7ac953 libexif-0.6.13-4.0.2.el5_1.1.ppc.rpm
78b8320d53f0e730eb9a7403e132605a libexif-0.6.13-4.0.2.el5_1.1.ppc64.rpm
2325b01e76dd387150789182f9966f8b libexif-debuginfo-0.6.13-4.0.2.el5_1.1.ppc.rpm
d1d108e272a0db54b3d59731a9c1ce55 libexif-debuginfo-0.6.13-4.0.2.el5_1.1.ppc64.rpm
70db0f13504d616e7cc33f38b4a308ca libexif-devel-0.6.13-4.0.2.el5_1.1.ppc.rpm
5aa61322b25614936b3e0af6dbdd0770 libexif-devel-0.6.13-4.0.2.el5_1.1.ppc64.rpm
s390x:
a4ce630587f200dac5017132df1b32bd libexif-0.6.13-4.0.2.el5_1.1.s390.rpm
e4e24274f53f54eafdab963c6827d26e libexif-0.6.13-4.0.2.el5_1.1.s390x.rpm
63c098ac83e4dde2e57ccefb3220bcd2 libexif-debuginfo-0.6.13-4.0.2.el5_1.1.s390.rpm
93cc0e5e78577be2ce118c329f27ca97 libexif-debuginfo-0.6.13-4.0.2.el5_1.1.s390x.rpm
12a3e54a8e9d55063f504c68b0aee802 libexif-devel-0.6.13-4.0.2.el5_1.1.s390.rpm
2caf7997904ed6242a03c86522bdabfc libexif-devel-0.6.13-4.0.2.el5_1.1.s390x.rpm
x86_64:
5f5e2fdebf5c7aeb88c4d25ce887edf3 libexif-0.6.13-4.0.2.el5_1.1.i386.rpm
91d485dd3c59491db18592d70a25a59a libexif-0.6.13-4.0.2.el5_1.1.x86_64.rpm
2ec8f0b6652c4c55b3923d2e319a6ec1 libexif-debuginfo-0.6.13-4.0.2.el5_1.1.i386.rpm
0a1a7b23c17e3dddb66022e1a039cebd libexif-debuginfo-0.6.13-4.0.2.el5_1.1.x86_64.rpm
eccd0c4354faa72f1aac98e074c53b4e libexif-devel-0.6.13-4.0.2.el5_1.1.i386.rpm
a4cd77aa35f9c6e302399e094ca66fef libexif-devel-0.6.13-4.0.2.el5_1.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6351
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6352
http://www.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2007 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFHaT0wXlSAg2UNWIIRAlwFAKCGcatbp/6XAqgTwndZLv1NUBSUuACglOZq
BG8iZuBm8c/FWC3ZnUErg8o=
=9a9l
-----END PGP SIGNATURE-----