Security update for libtiff
SUSE Security Update: Security update for libtiff
This tiff LTSS roll up update fixes several security issues.
* CVE-2013-4232 CVE-2013-4231: buffer overflows/use
after free problem
* CVE-2013-4243: libtiff (gif2tiff): heap-based buffer
overflow in readgifimage()
* CVE-2013-4244: libtiff (gif2tiff): OOB Write in LZW
decompressor
* CVE-2013-1961: Stack-based buffer overflow with
malformed image-length and resolution
* CVE-2013-1960: Heap-based buffer overflow in
t2_process_jpeg_strip()
* CVE-2012-4447: Heap-buffer overflow when processing a
TIFF image with PixarLog Compression
* CVE-2012-4564: Added a ppm2tiff missing return value
check
* CVE-2012-5581: Fixed Stack based buffer overflow when
handling DOTRANGE tags
* CVE-2012-3401: Fixed Heap-based buffer overflow due
to improper initialization of T2P context struct pointer
* CVE-2012-2113: integer overflow leading to heap-based
buffer overflow when parsing crafted tiff files
* Another heap-based memory corruption in the tiffp2s
commandline tool has been fixed [bnc#788741]
* CVE-2012-2088: A type conversion flaw in libtiff has
been fixed.
* CVE-2012-1173: A heap based buffer overflow in
TIFFReadRGBAImageOriented was fixed.
Security Issue references:
* CVE-2012-1173
>
* CVE-2012-2088
>
* CVE-2012-2113
>
* CVE-2012-3401
>
* CVE-2012-4447
>
* CVE-2012-4564
>
* CVE-2012-5581
>
* CVE-2013-1960
>
* CVE-2013-1961
>
* CVE-2013-4231
>
* CVE-2013-4232
>
* CVE-2013-4243
>
* CVE-2013-4244
>
Announcement ID: | SUSE-SU-2013:1639-1 |
Rating: | moderate |
References: | #753362 #767852 #767854 #770816 #781995 #787892 #788741 #791607 #817573 #818117 #834477 #834779 #834788 |
Affected Products: |
An update that fixes 13 vulnerabilities is now available.
Description:
This tiff LTSS roll up update fixes several security issues.
* CVE-2013-4232 CVE-2013-4231: buffer overflows/use
after free problem
* CVE-2013-4243: libtiff (gif2tiff): heap-based buffer
overflow in readgifimage()
* CVE-2013-4244: libtiff (gif2tiff): OOB Write in LZW
decompressor
* CVE-2013-1961: Stack-based buffer overflow with
malformed image-length and resolution
* CVE-2013-1960: Heap-based buffer overflow in
t2_process_jpeg_strip()
* CVE-2012-4447: Heap-buffer overflow when processing a
TIFF image with PixarLog Compression
* CVE-2012-4564: Added a ppm2tiff missing return value
check
* CVE-2012-5581: Fixed Stack based buffer overflow when
handling DOTRANGE tags
* CVE-2012-3401: Fixed Heap-based buffer overflow due
to improper initialization of T2P context struct pointer
* CVE-2012-2113: integer overflow leading to heap-based
buffer overflow when parsing crafted tiff files
* Another heap-based memory corruption in the tiffp2s
commandline tool has been fixed [bnc#788741]
* CVE-2012-2088: A type conversion flaw in libtiff has
been fixed.
* CVE-2012-1173: A heap based buffer overflow in
TIFFReadRGBAImageOriented was fixed.
Security Issue references:
* CVE-2012-1173
* CVE-2012-2088
* CVE-2012-2113
* CVE-2012-3401
* CVE-2012-4447
* CVE-2012-4564
* CVE-2012-5581
* CVE-2013-1960
* CVE-2013-1961
* CVE-2013-4231
* CVE-2013-4232
* CVE-2013-4243
* CVE-2013-4244
Package List:
- SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64):
- libtiff-3.8.2-5.36.1
- libtiff-devel-3.8.2-5.36.1
- tiff-3.8.2-5.36.1
- SUSE Linux Enterprise Server 10 SP3 LTSS (s390x x86_64):
- libtiff-32bit-3.8.2-5.36.1
- libtiff-devel-32bit-3.8.2-5.36.1
References:
- http://support.novell.com/security/cve/CVE-2012-1173.html
- http://support.novell.com/security/cve/CVE-2012-2088.html
- http://support.novell.com/security/cve/CVE-2012-2113.html
- http://support.novell.com/security/cve/CVE-2012-3401.html
- http://support.novell.com/security/cve/CVE-2012-4447.html
- http://support.novell.com/security/cve/CVE-2012-4564.html
- http://support.novell.com/security/cve/CVE-2012-5581.html
- http://support.novell.com/security/cve/CVE-2013-1960.html
- http://support.novell.com/security/cve/CVE-2013-1961.html
- http://support.novell.com/security/cve/CVE-2013-4231.html
- http://support.novell.com/security/cve/CVE-2013-4232.html
- http://support.novell.com/security/cve/CVE-2013-4243.html
- http://support.novell.com/security/cve/CVE-2013-4244.html
- https://bugzilla.novell.com/753362
- https://bugzilla.novell.com/767852
- https://bugzilla.novell.com/767854
- https://bugzilla.novell.com/770816
- https://bugzilla.novell.com/781995
- https://bugzilla.novell.com/787892
- https://bugzilla.novell.com/788741
- https://bugzilla.novell.com/791607
- https://bugzilla.novell.com/817573
- https://bugzilla.novell.com/818117
- https://bugzilla.novell.com/834477
- https://bugzilla.novell.com/834779
- https://bugzilla.novell.com/834788
- http://download.suse.com/patch/finder/?keywords=db898b28994a0ce2b1deaf3ee47ec36c