Security update for tiff
SUSE Security Update: Security update for tiff
Announcement ID: | SUSE-SU-2015:1475-1 |
Rating: | moderate |
References: | #914890 #916927 |
Affected Products: |
An update that fixes 5 vulnerabilities is now available.
Description:
LibTiff was updated to the 4.0.4 stable release fixing various security
issues and bugs.
These security issues were fixed:
- CVE-2014-8127: Out-of-bounds write (bnc#914890).
- CVE-2014-8128: Out-of-bounds write (bnc#914890).
- CVE-2014-8129: Out-of-bounds write (bnc#914890).
- CVE-2014-8130: Out-of-bounds write (bnc#914890).
- CVE-2014-9655: Access of uninitialized memory (bnc#916927).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12:
zypper in -t patch SUSE-SLE-SDK-12-2015-473=1
- SUSE Linux Enterprise Server 12:
zypper in -t patch SUSE-SLE-SERVER-12-2015-473=1
- SUSE Linux Enterprise Desktop 12:
zypper in -t patch SUSE-SLE-DESKTOP-12-2015-473=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64):
- libtiff-devel-4.0.4-12.2
- tiff-debuginfo-4.0.4-12.2
- tiff-debugsource-4.0.4-12.2
- SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):
- libtiff5-4.0.4-12.2
- libtiff5-debuginfo-4.0.4-12.2
- tiff-4.0.4-12.2
- tiff-debuginfo-4.0.4-12.2
- tiff-debugsource-4.0.4-12.2
- SUSE Linux Enterprise Server 12 (s390x x86_64):
- libtiff5-32bit-4.0.4-12.2
- libtiff5-debuginfo-32bit-4.0.4-12.2
- SUSE Linux Enterprise Desktop 12 (x86_64):
- libtiff5-32bit-4.0.4-12.2
- libtiff5-4.0.4-12.2
- libtiff5-debuginfo-32bit-4.0.4-12.2
- libtiff5-debuginfo-4.0.4-12.2
- tiff-debuginfo-4.0.4-12.2
- tiff-debugsource-4.0.4-12.2
References:
- https://www.suse.com/security/cve/CVE-2014-8127.html
- https://www.suse.com/security/cve/CVE-2014-8128.html
- https://www.suse.com/security/cve/CVE-2014-8129.html
- https://www.suse.com/security/cve/CVE-2014-8130.html
- https://www.suse.com/security/cve/CVE-2014-9655.html
- https://bugzilla.suse.com/914890
- https://bugzilla.suse.com/916927