openSUSE Security Update: libtiff security update ______________________________________________________________________________ Announcement ID: openSUSE-SU-2010:0619-1 Rating: important References: #624215 Cross-References: CVE-2010-3087 Affected Products: openSUSE 11.3 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: specially crafted tiff files could cause a memory corruption in libtiff. Attackers could potentially exploit that to execute arbitrary code in applications that use libtiff for processing tiff files (CVE-2010-3087). Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.3: zypper in -t patch libtiff-devel-3117 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 11.3 (i586 x86_64): libtiff-devel-3.9.2-5.2.1 libtiff3-3.9.2-5.2.1 tiff-3.9.2-5.2.1 - openSUSE 11.3 (x86_64): libtiff-devel-32bit-3.9.2-5.2.1 libtiff3-32bit-3.9.2-5.2.1 References: http://support.novell.com/security/cve/CVE-2010-3087.html https://bugzilla.novell.com/624215