SUSE-SU-2013:0198-1: moderate: Security update for libtiff

sle-updates at lists.suse.com sle-updates at lists.suse.com
Thu Jan 24 19:04:18 MST 2013


   SUSE Security Update: Security update for libtiff
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:0198-1
Rating:             moderate
References:         #781995 #787892 #788741 #791607 
Cross-References:   CVE-2012-4447 CVE-2012-4564 CVE-2012-5581
                   
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11 SP2
                    SUSE Linux Enterprise Server 11 SP2 for VMware
                    SUSE Linux Enterprise Server 11 SP2
                    SUSE Linux Enterprise Server 10 SP4
                    SUSE Linux Enterprise Desktop 11 SP2
                    SUSE Linux Enterprise Desktop 10 SP4
                    SLE SDK 10 SP4
______________________________________________________________________________

   An update that solves three vulnerabilities and has one
   errata is now available.

Description:


   Various memory corruption vulnerabilities have been fixed
   in libtiff.  CVE-2012-4447, CVE-2012-4564 and CVE-2012-5581
   have been assigned to these  issues.

   Security Issue references:

   * CVE-2012-4447
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4447
   >
   * CVE-2012-4564
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4564
   >
   * CVE-2012-5581
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5581
   >


Special Instructions and Notes:

   This update triggers a restart of the software management
   stack. More updates will be available for installation
   after applying this update and restarting the application.
   This update triggers a restart of the software management
   stack. More updates will be available for installation
   after applying this update and restarting the application.
   This update triggers a restart of the software management
   stack. More updates will be available for installation
   after applying this update and restarting the application.
   This update triggers a restart of the software management
   stack. More updates will be available for installation
   after applying this update and restarting the application.
   This update triggers a restart of the software management
   stack. More updates will be available for installation
   after applying this update and restarting the application.
   This update triggers a restart of the software management
   stack. More updates will be available for installation
   after applying this update and restarting the application.
   This update triggers a restart of the software management
   stack. More updates will be available for installation
   after applying this update and restarting the application.
   This update triggers a restart of the software management
   stack. More updates will be available for installation
   after applying this update and restarting the application.

Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11 SP2:

      zypper in -t patch sdksp2-libtiff-devel-7216

   - SUSE Linux Enterprise Server 11 SP2 for VMware:

      zypper in -t patch slessp2-libtiff-devel-7216

   - SUSE Linux Enterprise Server 11 SP2:

      zypper in -t patch slessp2-libtiff-devel-7216

   - SUSE Linux Enterprise Desktop 11 SP2:

      zypper in -t patch sledsp2-libtiff-devel-7216

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64):

      libtiff-devel-3.8.2-141.150.1

   - SUSE Linux Enterprise Software Development Kit 11 SP2 (ppc64 s390x x86_64):

      libtiff-devel-32bit-3.8.2-141.150.1

   - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64):

      libtiff3-3.8.2-141.150.1
      tiff-3.8.2-141.150.1

   - SUSE Linux Enterprise Server 11 SP2 for VMware (x86_64):

      libtiff3-32bit-3.8.2-141.150.1

   - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64):

      libtiff3-3.8.2-141.150.1
      tiff-3.8.2-141.150.1

   - SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64):

      libtiff3-32bit-3.8.2-141.150.1

   - SUSE Linux Enterprise Server 11 SP2 (ia64):

      libtiff3-x86-3.8.2-141.150.1

   - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64):

      libtiff-3.8.2-5.32.1
      libtiff-devel-3.8.2-5.32.1
      tiff-3.8.2-5.32.1

   - SUSE Linux Enterprise Server 10 SP4 (s390x x86_64):

      libtiff-32bit-3.8.2-5.32.1
      libtiff-devel-32bit-3.8.2-5.32.1

   - SUSE Linux Enterprise Server 10 SP4 (ia64):

      libtiff-x86-3.8.2-5.32.1

   - SUSE Linux Enterprise Server 10 SP4 (ppc):

      libtiff-64bit-3.8.2-5.32.1
      libtiff-devel-64bit-3.8.2-5.32.1

   - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64):

      libtiff3-3.8.2-141.150.1

   - SUSE Linux Enterprise Desktop 11 SP2 (x86_64):

      libtiff3-32bit-3.8.2-141.150.1

   - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64):

      libtiff-3.8.2-5.32.1
      libtiff-devel-3.8.2-5.32.1
      tiff-3.8.2-5.32.1

   - SUSE Linux Enterprise Desktop 10 SP4 (x86_64):

      libtiff-32bit-3.8.2-5.32.1

   - SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64):

      libtiff-devel-3.8.2-5.32.1

   - SLE SDK 10 SP4 (s390x x86_64):

      libtiff-devel-32bit-3.8.2-5.32.1

   - SLE SDK 10 SP4 (ppc):

      libtiff-devel-64bit-3.8.2-5.32.1


References:

   http://support.novell.com/security/cve/CVE-2012-4447.html
   http://support.novell.com/security/cve/CVE-2012-4564.html
   http://support.novell.com/security/cve/CVE-2012-5581.html
   https://bugzilla.novell.com/781995
   https://bugzilla.novell.com/787892
   https://bugzilla.novell.com/788741
   https://bugzilla.novell.com/791607
   http://download.novell.com/patch/finder/?keywords=293aa3466520f4b2119523440d11f5c3
   http://download.novell.com/patch/finder/?keywords=e82a9ac77700ce38cd74ae7a74f81150



More information about the sle-updates mailing list