Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in tiff
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in tiff
ID: SUSE-SU-2019:0786-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Module for Basesystem 15, SUSE Linux Enterprise Module for Desktop Applications 15, SUSE Linux Enterprise Module for Open Buildservice Development Tools 15, SUSE Linux Enterprise Module for Packagehub Subpackages 15
Datum: Do, 28. März 2019, 23:52
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17000
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19210
Applikationen: libtiff

Originalnachricht


SUSE Security Update: Security update for tiff
______________________________________________________________________________

Announcement ID: SUSE-SU-2019:0786-1
Rating: moderate
References: #1108606 #1115717 #1121626 #1125113
Cross-References: CVE-2018-17000 CVE-2018-19210 CVE-2019-6128
CVE-2019-7663
Affected Products:
SUSE Linux Enterprise Module for Packagehub Subpackages 15
SUSE Linux Enterprise Module for Open Buildservice
Development Tools 15
SUSE Linux Enterprise Module for Desktop Applications 15
SUSE Linux Enterprise Module for Basesystem 15
______________________________________________________________________________

An update that fixes four vulnerabilities is now available.

Description:

This update for tiff fixes the following issues:

Security issues fixed:

- CVE-2018-19210: Fixed a NULL pointer dereference in
TIFFWriteDirectorySec function (bsc#1115717).
- CVE-2018-17000: Fixed a NULL pointer dereference in the _TIFFmemcmp
function (bsc#1108606).
- CVE-2019-6128: Fixed a memory leak in the TIFFFdOpen function in
tif_unix.c (bsc#1121626).
- CVE-2019-7663: Fixed an invalid address dereference in the
TIFFWriteDirectoryTagTransfer function in libtiff/tif_dirwrite.c
(bsc#1125113)


Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Module for Packagehub Subpackages 15:

zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-2019-786=1

- SUSE Linux Enterprise Module for Open Buildservice Development Tools 15:

zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-2019-786=1

- SUSE Linux Enterprise Module for Desktop Applications 15:

zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-2019-786=1

- SUSE Linux Enterprise Module for Basesystem 15:

zypper in -t patch SUSE-SLE-Module-Basesystem-15-2019-786=1



Package List:

- SUSE Linux Enterprise Module for Packagehub Subpackages 15 (aarch64
ppc64le s390x x86_64):

tiff-4.0.9-5.27.5
tiff-debuginfo-4.0.9-5.27.5
tiff-debugsource-4.0.9-5.27.5

- SUSE Linux Enterprise Module for Open Buildservice Development Tools 15
(aarch64 ppc64le s390x x86_64):

tiff-4.0.9-5.27.5
tiff-debuginfo-4.0.9-5.27.5
tiff-debugsource-4.0.9-5.27.5

- SUSE Linux Enterprise Module for Desktop Applications 15 (x86_64):

libtiff5-32bit-4.0.9-5.27.5
libtiff5-32bit-debuginfo-4.0.9-5.27.5
tiff-debugsource-4.0.9-5.27.5

- SUSE Linux Enterprise Module for Basesystem 15 (aarch64 ppc64le s390x
x86_64):

libtiff-devel-4.0.9-5.27.5
libtiff5-4.0.9-5.27.5
libtiff5-debuginfo-4.0.9-5.27.5
tiff-debuginfo-4.0.9-5.27.5
tiff-debugsource-4.0.9-5.27.5


References:

https://www.suse.com/security/cve/CVE-2018-17000.html
https://www.suse.com/security/cve/CVE-2018-19210.html
https://www.suse.com/security/cve/CVE-2019-6128.html
https://www.suse.com/security/cve/CVE-2019-7663.html
https://bugzilla.suse.com/1108606
https://bugzilla.suse.com/1115717
https://bugzilla.suse.com/1121626
https://bugzilla.suse.com/1125113

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung