SUSE Security Update: Security update for tiff
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:2676-1
Rating:             moderate
References:         #1074186 #1092480 #960589 #983440 
Cross-References:   CVE-2015-8668 CVE-2016-5319 CVE-2017-17942
                    CVE-2018-10779
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11-SP4
                    SUSE Linux Enterprise Server 11-SP4
                    SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________

   An update that fixes four vulnerabilities is now available.

Description:

   This update for tiff fixes the following issues:

   The following security vulnerabilities were addressed:

   - CVE-2015-8668: Fixed a heap-based buffer overflow in the
     PackBitsPreEncode function in tif_packbits.c in bmp2tiff, which allowed
     remote attackers to execute arbitrary code or cause a denial of service
     via a large width field in a specially crafted BMP image. (bsc#960589)
   - CVE-2018-10779: Fixed a heap-based buffer over-read in
     TIFFWriteScanline() in tif_write.c (bsc#1092480)
   - CVE-2017-17942: Fixed a heap-based buffer overflow in the function
     PackBitsEncode in tif_packbits.c. (bsc#1074186)
   - CVE-2016-5319: Fixed a beap-based buffer overflow in bmp2tiff
     (bsc#983440)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11-SP4:

      zypper in -t patch sdksp4-tiff-13772=1

   - SUSE Linux Enterprise Server 11-SP4:

      zypper in -t patch slessp4-tiff-13772=1

   - SUSE Linux Enterprise Debuginfo 11-SP4:

      zypper in -t patch dbgsp4-tiff-13772=1



Package List:

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      libtiff-devel-3.8.2-141.169.16.1

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64 s390x x86_64):

      libtiff-devel-32bit-3.8.2-141.169.16.1

   - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      libtiff3-3.8.2-141.169.16.1
      tiff-3.8.2-141.169.16.1

   - SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64):

      libtiff3-32bit-3.8.2-141.169.16.1

   - SUSE Linux Enterprise Server 11-SP4 (ia64):

      libtiff3-x86-3.8.2-141.169.16.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      tiff-debuginfo-3.8.2-141.169.16.1
      tiff-debugsource-3.8.2-141.169.16.1


References:

   https://www.suse.com/security/cve/CVE-2015-8668.html
   https://www.suse.com/security/cve/CVE-2016-5319.html
   https://www.suse.com/security/cve/CVE-2017-17942.html
   https://www.suse.com/security/cve/CVE-2018-10779.html
   https://bugzilla.suse.com/1074186
   https://bugzilla.suse.com/1092480
   https://bugzilla.suse.com/960589
   https://bugzilla.suse.com/983440

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates

SUSE: 2018:2676-1 moderate: tiff

September 10, 2018
An update that fixes four vulnerabilities is now available

Summary

This update for tiff fixes the following issues: The following security vulnerabilities were addressed: - CVE-2015-8668: Fixed a heap-based buffer overflow in the PackBitsPreEncode function in tif_packbits.c in bmp2tiff, which allowed remote attackers to execute arbitrary code or cause a denial of service via a large width field in a specially crafted BMP image. (bsc#960589) - CVE-2018-10779: Fixed a heap-based buffer over-read in TIFFWriteScanline() in tif_write.c (bsc#1092480) - CVE-2017-17942: Fixed a heap-based buffer overflow in the function PackBitsEncode in tif_packbits.c. (bsc#1074186) - CVE-2016-5319: Fixed a beap-based buffer overflow in bmp2tiff (bsc#983440) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-tiff-13772=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-tiff-13772=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-tiff-13772=1 Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): libtiff-devel-3.8.2-141.169.16.1 - SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64 s390x x86_64): libtiff-devel-32bit-3.8.2-141.169.16.1 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): libtiff3-3.8.2-141.169.16.1 tiff-3.8.2-141.169.16.1 - SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64): libtiff3-32bit-3.8.2-141.169.16.1 - SUSE Linux Enterprise Server 11-SP4 (ia64): libtiff3-x86-3.8.2-141.169.16.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): tiff-debuginfo-3.8.2-141.169.16.1 tiff-debugsource-3.8.2-141.169.16.1

References

#1074186 #1092480 #960589 #983440

Cross- CVE-2015-8668 CVE-2016-5319 CVE-2017-17942

CVE-2018-10779

Affected Products:

SUSE Linux Enterprise Software Development Kit 11-SP4

SUSE Linux Enterprise Server 11-SP4

SUSE Linux Enterprise Debuginfo 11-SP4

https://www.suse.com/security/cve/CVE-2015-8668.html

https://www.suse.com/security/cve/CVE-2016-5319.html

https://www.suse.com/security/cve/CVE-2017-17942.html

https://www.suse.com/security/cve/CVE-2018-10779.html

https://bugzilla.suse.com/1074186

https://bugzilla.suse.com/1092480

https://bugzilla.suse.com/960589

https://bugzilla.suse.com/983440

Severity
Announcement ID: SUSE-SU-2018:2676-1
Rating: moderate

Related News