SUSE-SU-2013:0795-1: moderate: Security update for libtiff

sle-updates at lists.suse.com sle-updates at lists.suse.com
Wed May 15 14:04:29 MDT 2013


   SUSE Security Update: Security update for libtiff
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:0795-1
Rating:             moderate
References:         #817573 #818117 
Cross-References:   CVE-2013-1960 CVE-2013-1961
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11 SP2
                    SUSE Linux Enterprise Server 11 SP2 for VMware
                    SUSE Linux Enterprise Server 11 SP2
                    SUSE Linux Enterprise Server 10 SP4
                    SUSE Linux Enterprise Desktop 11 SP2
                    SUSE Linux Enterprise Desktop 10 SP4
                    SLE SDK 10 SP4
______________________________________________________________________________

   An update that fixes two vulnerabilities is now available.

Description:


   This update fixes two buffer overflow security issues with
   libtiff:

   * CVE-2013-1960
   * CVE-2013-1961

   Security Issue references:

   * CVE-2013-1960
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1960
   >
   * CVE-2013-1961
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1961
   >


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11 SP2:

      zypper in -t patch sdksp2-libtiff-devel-7707

   - SUSE Linux Enterprise Server 11 SP2 for VMware:

      zypper in -t patch slessp2-libtiff-devel-7707

   - SUSE Linux Enterprise Server 11 SP2:

      zypper in -t patch slessp2-libtiff-devel-7707

   - SUSE Linux Enterprise Desktop 11 SP2:

      zypper in -t patch sledsp2-libtiff-devel-7707

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64):

      libtiff-devel-3.8.2-141.152.1

   - SUSE Linux Enterprise Software Development Kit 11 SP2 (ppc64 s390x x86_64):

      libtiff-devel-32bit-3.8.2-141.152.1

   - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64):

      libtiff3-3.8.2-141.152.1
      tiff-3.8.2-141.152.1

   - SUSE Linux Enterprise Server 11 SP2 for VMware (x86_64):

      libtiff3-32bit-3.8.2-141.152.1

   - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64):

      libtiff3-3.8.2-141.152.1
      tiff-3.8.2-141.152.1

   - SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64):

      libtiff3-32bit-3.8.2-141.152.1

   - SUSE Linux Enterprise Server 11 SP2 (ia64):

      libtiff3-x86-3.8.2-141.152.1

   - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64):

      libtiff-3.8.2-5.34.1
      libtiff-devel-3.8.2-5.34.1
      tiff-3.8.2-5.34.1

   - SUSE Linux Enterprise Server 10 SP4 (s390x x86_64):

      libtiff-32bit-3.8.2-5.34.1
      libtiff-devel-32bit-3.8.2-5.34.1

   - SUSE Linux Enterprise Server 10 SP4 (ia64):

      libtiff-x86-3.8.2-5.34.1

   - SUSE Linux Enterprise Server 10 SP4 (ppc):

      libtiff-64bit-3.8.2-5.34.1
      libtiff-devel-64bit-3.8.2-5.34.1

   - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64):

      libtiff3-3.8.2-141.152.1

   - SUSE Linux Enterprise Desktop 11 SP2 (x86_64):

      libtiff3-32bit-3.8.2-141.152.1

   - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64):

      libtiff-3.8.2-5.34.1
      libtiff-devel-3.8.2-5.34.1
      tiff-3.8.2-5.34.1

   - SUSE Linux Enterprise Desktop 10 SP4 (x86_64):

      libtiff-32bit-3.8.2-5.34.1

   - SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64):

      libtiff-devel-3.8.2-5.34.1

   - SLE SDK 10 SP4 (s390x x86_64):

      libtiff-devel-32bit-3.8.2-5.34.1

   - SLE SDK 10 SP4 (ppc):

      libtiff-devel-64bit-3.8.2-5.34.1


References:

   http://support.novell.com/security/cve/CVE-2013-1960.html
   http://support.novell.com/security/cve/CVE-2013-1961.html
   https://bugzilla.novell.com/817573
   https://bugzilla.novell.com/818117
   http://download.novell.com/patch/finder/?keywords=2281c07d506043b014b0b2aa06f2d47f
   http://download.novell.com/patch/finder/?keywords=7ec0732ff5c7ebf5edea88ea24721440



More information about the sle-updates mailing list