SUSE-SU-2014:0023-1: moderate: Security update for pixman

sle-updates at lists.suse.com sle-updates at lists.suse.com
Mon Jan 6 16:04:18 MST 2014


   SUSE Security Update: Security update for pixman
______________________________________________________________________________

Announcement ID:    SUSE-SU-2014:0023-1
Rating:             moderate
References:         #853824 
Cross-References:   CVE-2013-6425
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11 SP3
                    SUSE Linux Enterprise Software Development Kit 11 SP2
                    SUSE Linux Enterprise Server 11 SP3 for VMware
                    SUSE Linux Enterprise Server 11 SP3
                    SUSE Linux Enterprise Server 11 SP2 for VMware
                    SUSE Linux Enterprise Server 11 SP2
                    SUSE Linux Enterprise Desktop 11 SP3
                    SUSE Linux Enterprise Desktop 11 SP2
______________________________________________________________________________

   An update that fixes one vulnerability is now available.

Description:


   This update fixes the following security issue with pixman:

   * Integer underflow when handling trapezoids.
   (bnc#853824, CVE-2013-6425)

   Security Issues:

   * CVE-2013-6425
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6425
   >


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11 SP3:

      zypper in -t patch sdksp3-libpixman-1-0-8697

   - SUSE Linux Enterprise Software Development Kit 11 SP2:

      zypper in -t patch sdksp2-libpixman-1-0-8701

   - SUSE Linux Enterprise Server 11 SP3 for VMware:

      zypper in -t patch slessp3-libpixman-1-0-8697

   - SUSE Linux Enterprise Server 11 SP3:

      zypper in -t patch slessp3-libpixman-1-0-8697

   - SUSE Linux Enterprise Server 11 SP2 for VMware:

      zypper in -t patch slessp2-libpixman-1-0-8701

   - SUSE Linux Enterprise Server 11 SP2:

      zypper in -t patch slessp2-libpixman-1-0-8701

   - SUSE Linux Enterprise Desktop 11 SP3:

      zypper in -t patch sledsp3-libpixman-1-0-8697

   - SUSE Linux Enterprise Desktop 11 SP2:

      zypper in -t patch sledsp2-libpixman-1-0-8701

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64):

      libpixman-1-0-devel-0.24.4-0.15.1

   - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64):

      libpixman-1-0-devel-0.16.0-1.4.1

   - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):

      libpixman-1-0-0.24.4-0.15.1

   - SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64):

      libpixman-1-0-32bit-0.24.4-0.15.1

   - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):

      libpixman-1-0-0.24.4-0.15.1

   - SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64):

      libpixman-1-0-32bit-0.24.4-0.15.1

   - SUSE Linux Enterprise Server 11 SP3 (ia64):

      libpixman-1-0-x86-0.24.4-0.15.1

   - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64):

      libpixman-1-0-0.16.0-1.4.1

   - SUSE Linux Enterprise Server 11 SP2 for VMware (x86_64):

      libpixman-1-0-32bit-0.16.0-1.4.1

   - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64):

      libpixman-1-0-0.16.0-1.4.1

   - SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64):

      libpixman-1-0-32bit-0.16.0-1.4.1

   - SUSE Linux Enterprise Server 11 SP2 (ia64):

      libpixman-1-0-x86-0.16.0-1.4.1

   - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):

      libpixman-1-0-0.24.4-0.15.1

   - SUSE Linux Enterprise Desktop 11 SP3 (x86_64):

      libpixman-1-0-32bit-0.24.4-0.15.1

   - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64):

      libpixman-1-0-0.16.0-1.4.1
      libpixman-1-0-devel-0.16.0-1.4.1

   - SUSE Linux Enterprise Desktop 11 SP2 (x86_64):

      libpixman-1-0-32bit-0.16.0-1.4.1


References:

   http://support.novell.com/security/cve/CVE-2013-6425.html
   https://bugzilla.novell.com/853824
   http://download.novell.com/patch/finder/?keywords=1fc79e726107e92e1e2aec08550e036e
   http://download.novell.com/patch/finder/?keywords=91193a18682bc9249c55cfc64718cdf3



More information about the sle-updates mailing list