Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-5314
Vulnerability from cvelistv5
Published
2018-03-12 02:00
Modified
2024-08-06 01:00
Severity ?
EPSS score ?
Summary
Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T01:00:58.231Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "DSA-3762", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2017/dsa-3762", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { name: "openSUSE-SU-2016:3035", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html", }, { name: "91195", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/91195", }, { name: "openSUSE-SU-2016:2321", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html", }, { name: "[oss-security] 20160615 CVE-2016-5314: libtiff 4.0.6 PixarLogDecode() out-of-bound writes", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/06/15/1", }, { name: "91245", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/91245", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1346687", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/vadz/libtiff/commit/391e77fcd217e78b2c51342ac3ddb7100ecacdd2", }, { name: "GLSA-201701-16", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-16", }, { name: "openSUSE-SU-2016:1889", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-07/msg00087.html", }, { name: "openSUSE-SU-2016:2375", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html", }, { name: "[oss-security] 20160615 CVE-2016-5320: libtiff 4.0.6 rgb2ycbcr: command excution", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/06/15/9", }, { name: "[oss-security] 20160630 Re: Re: CVE request: Heap-based buffer overflow in LibTIFF when using the PixarLog compression format", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/06/30/3", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://bugzilla.maptools.org/show_bug.cgi?id=2554", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-06-15T00:00:00", descriptions: [ { lang: "en", value: "Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-03-12T09:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "DSA-3762", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2017/dsa-3762", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { name: "openSUSE-SU-2016:3035", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html", }, { name: "91195", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/91195", }, { name: "openSUSE-SU-2016:2321", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html", }, { name: "[oss-security] 20160615 CVE-2016-5314: libtiff 4.0.6 PixarLogDecode() out-of-bound writes", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/06/15/1", }, { name: "91245", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/91245", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1346687", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/vadz/libtiff/commit/391e77fcd217e78b2c51342ac3ddb7100ecacdd2", }, { name: "GLSA-201701-16", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-16", }, { name: "openSUSE-SU-2016:1889", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-07/msg00087.html", }, { name: "openSUSE-SU-2016:2375", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html", }, { name: "[oss-security] 20160615 CVE-2016-5320: libtiff 4.0.6 rgb2ycbcr: command excution", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/06/15/9", }, { name: "[oss-security] 20160630 Re: Re: CVE request: Heap-based buffer overflow in LibTIFF when using the PixarLog compression format", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/06/30/3", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://bugzilla.maptools.org/show_bug.cgi?id=2554", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-5314", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "DSA-3762", refsource: "DEBIAN", url: "https://www.debian.org/security/2017/dsa-3762", }, { name: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { name: "openSUSE-SU-2016:3035", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html", }, { name: "91195", refsource: "BID", url: "http://www.securityfocus.com/bid/91195", }, { name: "openSUSE-SU-2016:2321", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html", }, { name: "[oss-security] 20160615 CVE-2016-5314: libtiff 4.0.6 PixarLogDecode() out-of-bound writes", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/06/15/1", }, { name: "91245", refsource: "BID", url: "http://www.securityfocus.com/bid/91245", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1346687", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1346687", }, { name: "https://github.com/vadz/libtiff/commit/391e77fcd217e78b2c51342ac3ddb7100ecacdd2", refsource: "CONFIRM", url: "https://github.com/vadz/libtiff/commit/391e77fcd217e78b2c51342ac3ddb7100ecacdd2", }, { name: "GLSA-201701-16", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-16", }, { name: "openSUSE-SU-2016:1889", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-07/msg00087.html", }, { name: "openSUSE-SU-2016:2375", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html", }, { name: "[oss-security] 20160615 CVE-2016-5320: libtiff 4.0.6 rgb2ycbcr: command excution", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/06/15/9", }, { name: "[oss-security] 20160630 Re: Re: CVE request: Heap-based buffer overflow in LibTIFF when using the PixarLog compression format", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/06/30/3", }, { name: "http://bugzilla.maptools.org/show_bug.cgi?id=2554", refsource: "CONFIRM", url: "http://bugzilla.maptools.org/show_bug.cgi?id=2554", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2016-5314", datePublished: "2018-03-12T02:00:00", dateReserved: "2016-06-06T00:00:00", dateUpdated: "2024-08-06T01:00:58.231Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2016-5314\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-03-12T02:29:00.400\",\"lastModified\":\"2024-11-21T02:54:04.997\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de búfer en la función PixarLogDecode en tif_pixarlog.c en LibTIFF, en versiones 4.0.6 y anteriores, permite que atacantes remotos provoquen una denegación de servicio (cierre inesperado de la aplicación) u otro tipo de impacto sin especificar mediante una imagen TIFF manipulada. Esto se demuestra sobrescribiendo el puntero de función vgetparent con rgb2ycbcr.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0.6\",\"matchCriteriaId\":\"7DBB051D-E94D-4553-88A6-750BE80B7617\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4863BE36-D16A-4D75-90D9-FD76DB5B48B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10BC294-9196-425F-9FB0-B1625465B47F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03117DF1-3BEC-4B8D-AD63-DBBDB2126081\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}],\"references\":[{\"url\":\"http://bugzilla.maptools.org/show_bug.cgi?id=2554\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2016-07/msg00087.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/06/15/1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/06/15/9\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/06/30/3\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/91195\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/91245\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1346687\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/vadz/libtiff/commit/391e77fcd217e78b2c51342ac3ddb7100ecacdd2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://security.gentoo.org/glsa/201701-16\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2017/dsa-3762\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://bugzilla.maptools.org/show_bug.cgi?id=2554\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2016-07/msg00087.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/06/15/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/06/15/9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/06/30/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/91195\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/91245\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1346687\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/vadz/libtiff/commit/391e77fcd217e78b2c51342ac3ddb7100ecacdd2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://security.gentoo.org/glsa/201701-16\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2017/dsa-3762\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", }, }
fkie_cve-2016-5314
Vulnerability from fkie_nvd
Published
2018-03-12 02:29
Modified
2024-11-21 02:54
Severity ?
Summary
Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libtiff | libtiff | * | |
opensuse | leap | 42.1 | |
opensuse | opensuse | 13.1 | |
opensuse | opensuse | 13.2 | |
redhat | enterprise_linux | 6.0 | |
redhat | enterprise_linux | 7.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*", matchCriteriaId: "7DBB051D-E94D-4553-88A6-750BE80B7617", versionEndIncluding: "4.0.6", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", matchCriteriaId: "4863BE36-D16A-4D75-90D9-FD76DB5B48B7", vulnerable: true, }, { criteria: "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", matchCriteriaId: "A10BC294-9196-425F-9FB0-B1625465B47F", vulnerable: true, }, { criteria: "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", matchCriteriaId: "03117DF1-3BEC-4B8D-AD63-DBBDB2126081", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", matchCriteriaId: "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", matchCriteriaId: "142AD0DD-4CF3-4D74-9442-459CE3347E3A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.", }, { lang: "es", value: "Desbordamiento de búfer en la función PixarLogDecode en tif_pixarlog.c en LibTIFF, en versiones 4.0.6 y anteriores, permite que atacantes remotos provoquen una denegación de servicio (cierre inesperado de la aplicación) u otro tipo de impacto sin especificar mediante una imagen TIFF manipulada. Esto se demuestra sobrescribiendo el puntero de función vgetparent con rgb2ycbcr.", }, ], id: "CVE-2016-5314", lastModified: "2024-11-21T02:54:04.997", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-03-12T02:29:00.400", references: [ { source: "cve@mitre.org", tags: [ "Exploit", "Issue Tracking", ], url: "http://bugzilla.maptools.org/show_bug.cgi?id=2554", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2016-07/msg00087.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2016/06/15/1", }, { source: "cve@mitre.org", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2016/06/15/9", }, { source: "cve@mitre.org", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2016/06/30/3", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/91195", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/91245", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1346687", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "https://github.com/vadz/libtiff/commit/391e77fcd217e78b2c51342ac3ddb7100ecacdd2", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201701-16", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2017/dsa-3762", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Issue Tracking", ], url: "http://bugzilla.maptools.org/show_bug.cgi?id=2554", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2016-07/msg00087.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2016/06/15/1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2016/06/15/9", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2016/06/30/3", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/91195", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/91245", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1346687", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "https://github.com/vadz/libtiff/commit/391e77fcd217e78b2c51342ac3ddb7100ecacdd2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201701-16", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2017/dsa-3762", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
suse-su-2016:2527-1
Vulnerability from csaf_suse
Published
2016-10-13 11:59
Modified
2016-10-13 11:59
Summary
Security update for tiff
Notes
Title of the patch
Security update for tiff
Description of the patch
This update for tiff fixes the following issues:
- CVE-2016-3622: Specially crafted TIFF images could trigger a crash in tiff2rgba (bsc#974449)
- Various out-of-bound write vulnerabilities with unspecified impact (MSVR 35093, MSVR 35094, MSVR 35095, MSVR 35096, MSVR 35097, MSVR 35098)
- CVE-2016-5314: Specially crafted TIFF images could trigger a crash that could result in DoS (bsc#984831)
- CVE-2016-5316: Specially crafted TIFF images could trigger a crash in the rgb2ycbcr tool, leading to Doa (bsc#984837)
- CVE-2016-5317: Specially crafted TIFF images could trigger a crash through an out of bound write (bsc#984842)
- CVE-2016-5320: Specially crafted TIFF images could trigger a crash or potentially allow remote code execution when using the rgb2ycbcr command (bsc#984808)
- CVE-2016-5875: Specially crafted TIFF images could trigger could allow arbitrary code execution (bsc#987351)
- CVE-2016-3623: Specially crafted TIFF images could trigger a crash in rgb2ycbcr (bsc#974618)
- CVE-2016-3945: Specially crafted TIFF images could trigger a crash or allow for arbitrary command execution via tiff2rgba (bsc#974614)
- CVE-2016-3990: Specially crafted TIFF images could trigger a crash or allow for arbitrary command execution (bsc#975069)
- CVE-2016-3186: Specially crafted TIFF imaged could trigger a crash in the gif2tiff command via a buffer overflow (bsc#973340)
Patchnames
sdksp4-tiff-12785,slessp4-tiff-12785
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for tiff", title: "Title of the patch", }, { category: "description", text: "This update for tiff fixes the following issues:\n\n- CVE-2016-3622: Specially crafted TIFF images could trigger a crash in tiff2rgba (bsc#974449)\n- Various out-of-bound write vulnerabilities with unspecified impact (MSVR 35093, MSVR 35094, MSVR 35095, MSVR 35096, MSVR 35097, MSVR 35098)\n- CVE-2016-5314: Specially crafted TIFF images could trigger a crash that could result in DoS (bsc#984831)\n- CVE-2016-5316: Specially crafted TIFF images could trigger a crash in the rgb2ycbcr tool, leading to Doa (bsc#984837)\n- CVE-2016-5317: Specially crafted TIFF images could trigger a crash through an out of bound write (bsc#984842)\n- CVE-2016-5320: Specially crafted TIFF images could trigger a crash or potentially allow remote code execution when using the rgb2ycbcr command (bsc#984808)\n- CVE-2016-5875: Specially crafted TIFF images could trigger could allow arbitrary code execution (bsc#987351)\n- CVE-2016-3623: Specially crafted TIFF images could trigger a crash in rgb2ycbcr (bsc#974618)\n- CVE-2016-3945: Specially crafted TIFF images could trigger a crash or allow for arbitrary command execution via tiff2rgba (bsc#974614)\n- CVE-2016-3990: Specially crafted TIFF images could trigger a crash or allow for arbitrary command execution (bsc#975069)\n- CVE-2016-3186: Specially crafted TIFF imaged could trigger a crash in the gif2tiff command via a buffer overflow (bsc#973340)\n", title: "Description of the patch", }, { category: "details", text: "sdksp4-tiff-12785,slessp4-tiff-12785", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2527-1.json", }, { category: "self", summary: "URL for SUSE-SU-2016:2527-1", url: "https://www.suse.com/support/update/announcement/2016/suse-su-20162527-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2016:2527-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002331.html", }, { category: "self", summary: "SUSE Bug 973340", url: "https://bugzilla.suse.com/973340", }, { category: "self", summary: "SUSE Bug 974449", url: "https://bugzilla.suse.com/974449", }, { category: "self", summary: "SUSE Bug 974614", url: "https://bugzilla.suse.com/974614", }, { category: "self", summary: "SUSE Bug 974618", url: "https://bugzilla.suse.com/974618", }, { category: "self", summary: "SUSE Bug 975069", url: "https://bugzilla.suse.com/975069", }, { category: "self", summary: "SUSE Bug 984808", url: "https://bugzilla.suse.com/984808", }, { category: "self", summary: "SUSE Bug 984831", url: "https://bugzilla.suse.com/984831", }, { category: "self", summary: "SUSE Bug 984837", url: "https://bugzilla.suse.com/984837", }, { category: "self", summary: "SUSE Bug 984842", url: "https://bugzilla.suse.com/984842", }, { category: "self", summary: "SUSE Bug 987351", url: "https://bugzilla.suse.com/987351", }, { category: "self", summary: "SUSE CVE CVE-2016-3186 page", url: "https://www.suse.com/security/cve/CVE-2016-3186/", }, { category: "self", summary: "SUSE CVE CVE-2016-3622 page", url: "https://www.suse.com/security/cve/CVE-2016-3622/", }, { category: "self", summary: "SUSE CVE CVE-2016-3623 page", url: "https://www.suse.com/security/cve/CVE-2016-3623/", }, { category: "self", summary: "SUSE CVE CVE-2016-3945 page", url: "https://www.suse.com/security/cve/CVE-2016-3945/", }, { category: "self", summary: "SUSE CVE CVE-2016-3990 page", url: "https://www.suse.com/security/cve/CVE-2016-3990/", }, { category: "self", summary: "SUSE CVE CVE-2016-5314 page", url: "https://www.suse.com/security/cve/CVE-2016-5314/", }, { category: "self", summary: "SUSE CVE CVE-2016-5316 page", url: "https://www.suse.com/security/cve/CVE-2016-5316/", }, { category: "self", summary: "SUSE CVE CVE-2016-5317 page", url: "https://www.suse.com/security/cve/CVE-2016-5317/", }, { category: "self", summary: "SUSE CVE CVE-2016-5320 page", url: "https://www.suse.com/security/cve/CVE-2016-5320/", }, { category: "self", summary: "SUSE CVE CVE-2016-5875 page", url: "https://www.suse.com/security/cve/CVE-2016-5875/", }, ], title: "Security update for tiff", tracking: { current_release_date: "2016-10-13T11:59:37Z", generator: { date: "2016-10-13T11:59:37Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2016:2527-1", initial_release_date: "2016-10-13T11:59:37Z", revision_history: [ { date: "2016-10-13T11:59:37Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libtiff-devel-3.8.2-141.168.1.i586", product: { name: "libtiff-devel-3.8.2-141.168.1.i586", product_id: "libtiff-devel-3.8.2-141.168.1.i586", }, }, { category: "product_version", name: "libtiff3-3.8.2-141.168.1.i586", product: { name: "libtiff3-3.8.2-141.168.1.i586", product_id: "libtiff3-3.8.2-141.168.1.i586", }, }, { category: "product_version", name: "tiff-3.8.2-141.168.1.i586", product: { name: "tiff-3.8.2-141.168.1.i586", product_id: "tiff-3.8.2-141.168.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "libtiff-devel-3.8.2-141.168.1.ia64", product: { name: "libtiff-devel-3.8.2-141.168.1.ia64", product_id: "libtiff-devel-3.8.2-141.168.1.ia64", }, }, { category: "product_version", name: "libtiff3-3.8.2-141.168.1.ia64", product: { name: "libtiff3-3.8.2-141.168.1.ia64", product_id: "libtiff3-3.8.2-141.168.1.ia64", }, }, { category: "product_version", name: "libtiff3-x86-3.8.2-141.168.1.ia64", product: { name: "libtiff3-x86-3.8.2-141.168.1.ia64", product_id: "libtiff3-x86-3.8.2-141.168.1.ia64", }, }, { category: "product_version", name: "tiff-3.8.2-141.168.1.ia64", product: { name: "tiff-3.8.2-141.168.1.ia64", product_id: "tiff-3.8.2-141.168.1.ia64", }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "libtiff-devel-3.8.2-141.168.1.ppc64", product: { name: "libtiff-devel-3.8.2-141.168.1.ppc64", product_id: "libtiff-devel-3.8.2-141.168.1.ppc64", }, }, { category: "product_version", name: "libtiff-devel-32bit-3.8.2-141.168.1.ppc64", product: { name: "libtiff-devel-32bit-3.8.2-141.168.1.ppc64", product_id: "libtiff-devel-32bit-3.8.2-141.168.1.ppc64", }, }, { category: "product_version", name: "libtiff3-3.8.2-141.168.1.ppc64", product: { name: "libtiff3-3.8.2-141.168.1.ppc64", product_id: "libtiff3-3.8.2-141.168.1.ppc64", }, }, { category: "product_version", name: "libtiff3-32bit-3.8.2-141.168.1.ppc64", product: { name: "libtiff3-32bit-3.8.2-141.168.1.ppc64", product_id: "libtiff3-32bit-3.8.2-141.168.1.ppc64", }, }, { category: "product_version", name: "tiff-3.8.2-141.168.1.ppc64", product: { name: "tiff-3.8.2-141.168.1.ppc64", product_id: "tiff-3.8.2-141.168.1.ppc64", }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "libtiff-devel-3.8.2-141.168.1.s390x", product: { name: "libtiff-devel-3.8.2-141.168.1.s390x", product_id: "libtiff-devel-3.8.2-141.168.1.s390x", }, }, { category: "product_version", name: "libtiff-devel-32bit-3.8.2-141.168.1.s390x", product: { name: "libtiff-devel-32bit-3.8.2-141.168.1.s390x", product_id: "libtiff-devel-32bit-3.8.2-141.168.1.s390x", }, }, { category: "product_version", name: "libtiff3-3.8.2-141.168.1.s390x", product: { name: "libtiff3-3.8.2-141.168.1.s390x", product_id: "libtiff3-3.8.2-141.168.1.s390x", }, }, { category: "product_version", name: "libtiff3-32bit-3.8.2-141.168.1.s390x", product: { name: "libtiff3-32bit-3.8.2-141.168.1.s390x", product_id: "libtiff3-32bit-3.8.2-141.168.1.s390x", }, }, { category: "product_version", name: "tiff-3.8.2-141.168.1.s390x", product: { name: "tiff-3.8.2-141.168.1.s390x", product_id: "tiff-3.8.2-141.168.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "libtiff-devel-3.8.2-141.168.1.x86_64", product: { name: "libtiff-devel-3.8.2-141.168.1.x86_64", product_id: "libtiff-devel-3.8.2-141.168.1.x86_64", }, }, { category: "product_version", name: "libtiff-devel-32bit-3.8.2-141.168.1.x86_64", product: { name: "libtiff-devel-32bit-3.8.2-141.168.1.x86_64", product_id: "libtiff-devel-32bit-3.8.2-141.168.1.x86_64", }, }, { category: "product_version", name: "libtiff3-3.8.2-141.168.1.x86_64", product: { name: "libtiff3-3.8.2-141.168.1.x86_64", product_id: "libtiff3-3.8.2-141.168.1.x86_64", }, }, { category: "product_version", name: "libtiff3-32bit-3.8.2-141.168.1.x86_64", product: { name: "libtiff3-32bit-3.8.2-141.168.1.x86_64", product_id: "libtiff3-32bit-3.8.2-141.168.1.x86_64", }, }, { category: "product_version", name: "tiff-3.8.2-141.168.1.x86_64", product: { name: "tiff-3.8.2-141.168.1.x86_64", product_id: "tiff-3.8.2-141.168.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 11 SP4", product: { name: "SUSE Linux Enterprise Software Development Kit 11 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 11 SP4", product_identification_helper: { cpe: "cpe:/a:suse:sle-sdk:11:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 11 SP4", product: { name: "SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4", product_identification_helper: { cpe: "cpe:/o:suse:suse_sles:11:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:11:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libtiff-devel-3.8.2-141.168.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.i586", }, product_reference: "libtiff-devel-3.8.2-141.168.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-3.8.2-141.168.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ia64", }, product_reference: "libtiff-devel-3.8.2-141.168.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-3.8.2-141.168.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ppc64", }, product_reference: "libtiff-devel-3.8.2-141.168.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-3.8.2-141.168.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.s390x", }, product_reference: "libtiff-devel-3.8.2-141.168.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-3.8.2-141.168.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.x86_64", }, product_reference: "libtiff-devel-3.8.2-141.168.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-32bit-3.8.2-141.168.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.ppc64", }, product_reference: "libtiff-devel-32bit-3.8.2-141.168.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-32bit-3.8.2-141.168.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.s390x", }, product_reference: "libtiff-devel-32bit-3.8.2-141.168.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-32bit-3.8.2-141.168.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.x86_64", }, product_reference: "libtiff-devel-32bit-3.8.2-141.168.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-3.8.2-141.168.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.i586", }, product_reference: "libtiff3-3.8.2-141.168.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-3.8.2-141.168.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ia64", }, product_reference: "libtiff3-3.8.2-141.168.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-3.8.2-141.168.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", }, product_reference: "libtiff3-3.8.2-141.168.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-3.8.2-141.168.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.s390x", }, product_reference: "libtiff3-3.8.2-141.168.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-3.8.2-141.168.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", }, product_reference: "libtiff3-3.8.2-141.168.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-32bit-3.8.2-141.168.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", }, product_reference: "libtiff3-32bit-3.8.2-141.168.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-32bit-3.8.2-141.168.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", }, product_reference: "libtiff3-32bit-3.8.2-141.168.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-32bit-3.8.2-141.168.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", }, product_reference: "libtiff3-32bit-3.8.2-141.168.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-x86-3.8.2-141.168.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", }, product_reference: "libtiff3-x86-3.8.2-141.168.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "tiff-3.8.2-141.168.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.i586", }, product_reference: "tiff-3.8.2-141.168.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "tiff-3.8.2-141.168.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ia64", }, product_reference: "tiff-3.8.2-141.168.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "tiff-3.8.2-141.168.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ppc64", }, product_reference: "tiff-3.8.2-141.168.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "tiff-3.8.2-141.168.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.s390x", }, product_reference: "tiff-3.8.2-141.168.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "tiff-3.8.2-141.168.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.x86_64", }, product_reference: "tiff-3.8.2-141.168.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-3.8.2-141.168.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.i586", }, product_reference: "libtiff3-3.8.2-141.168.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-3.8.2-141.168.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ia64", }, product_reference: "libtiff3-3.8.2-141.168.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-3.8.2-141.168.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", }, product_reference: "libtiff3-3.8.2-141.168.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-3.8.2-141.168.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.s390x", }, product_reference: "libtiff3-3.8.2-141.168.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-3.8.2-141.168.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", }, product_reference: "libtiff3-3.8.2-141.168.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-32bit-3.8.2-141.168.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", }, product_reference: "libtiff3-32bit-3.8.2-141.168.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-32bit-3.8.2-141.168.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", }, product_reference: "libtiff3-32bit-3.8.2-141.168.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-32bit-3.8.2-141.168.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", }, product_reference: "libtiff3-32bit-3.8.2-141.168.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-x86-3.8.2-141.168.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", }, product_reference: "libtiff3-x86-3.8.2-141.168.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "tiff-3.8.2-141.168.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.i586", }, product_reference: "tiff-3.8.2-141.168.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "tiff-3.8.2-141.168.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ia64", }, product_reference: "tiff-3.8.2-141.168.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "tiff-3.8.2-141.168.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ppc64", }, product_reference: "tiff-3.8.2-141.168.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "tiff-3.8.2-141.168.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.s390x", }, product_reference: "tiff-3.8.2-141.168.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "tiff-3.8.2-141.168.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.x86_64", }, product_reference: "tiff-3.8.2-141.168.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, ], }, vulnerabilities: [ { cve: "CVE-2016-3186", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3186", }, ], notes: [ { category: "general", text: "Buffer overflow in the readextension function in gif2tiff.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (application crash) via a crafted GIF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3186", url: "https://www.suse.com/security/cve/CVE-2016-3186", }, { category: "external", summary: "SUSE Bug 973340 for CVE-2016-3186", url: "https://bugzilla.suse.com/973340", }, { category: "external", summary: "SUSE Bug 983268 for CVE-2016-3186", url: "https://bugzilla.suse.com/983268", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-10-13T11:59:37Z", details: "moderate", }, ], title: "CVE-2016-3186", }, { cve: "CVE-2016-3622", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3622", }, ], notes: [ { category: "general", text: "The fpAcc function in tif_predict.c in the tiff2rgba tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted TIFF image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3622", url: "https://www.suse.com/security/cve/CVE-2016-3622", }, { category: "external", summary: "SUSE Bug 974449 for CVE-2016-3622", url: "https://bugzilla.suse.com/974449", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-10-13T11:59:37Z", details: "low", }, ], title: "CVE-2016-3622", }, { cve: "CVE-2016-3623", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3623", }, ], notes: [ { category: "general", text: "The rgb2ycbcr tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero) by setting the (1) v or (2) h parameter to 0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3623", url: "https://www.suse.com/security/cve/CVE-2016-3623", }, { category: "external", summary: "SUSE Bug 974617 for CVE-2016-3623", url: "https://bugzilla.suse.com/974617", }, { category: "external", summary: "SUSE Bug 974618 for CVE-2016-3623", url: "https://bugzilla.suse.com/974618", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-10-13T11:59:37Z", details: "low", }, ], title: "CVE-2016-3623", }, { cve: "CVE-2016-3945", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3945", }, ], notes: [ { category: "general", text: "Multiple integer overflows in the (1) cvt_by_strip and (2) cvt_by_tile functions in the tiff2rgba tool in LibTIFF 4.0.6 and earlier, when -b mode is enabled, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image, which triggers an out-of-bounds write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3945", url: "https://www.suse.com/security/cve/CVE-2016-3945", }, { category: "external", summary: "SUSE Bug 974614 for CVE-2016-3945", url: "https://bugzilla.suse.com/974614", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-10-13T11:59:37Z", details: "low", }, ], title: "CVE-2016-3945", }, { cve: "CVE-2016-3990", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3990", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the horizontalDifference8 function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image to tiffcp.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3990", url: "https://www.suse.com/security/cve/CVE-2016-3990", }, { category: "external", summary: "SUSE Bug 975069 for CVE-2016-3990", url: "https://bugzilla.suse.com/975069", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-10-13T11:59:37Z", details: "low", }, ], title: "CVE-2016-3990", }, { cve: "CVE-2016-5314", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5314", }, ], notes: [ { category: "general", text: "Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5314", url: "https://www.suse.com/security/cve/CVE-2016-5314", }, { category: "external", summary: "SUSE Bug 984831 for CVE-2016-5314", url: "https://bugzilla.suse.com/984831", }, { category: "external", summary: "SUSE Bug 987351 for CVE-2016-5314", url: "https://bugzilla.suse.com/987351", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-10-13T11:59:37Z", details: "moderate", }, ], title: "CVE-2016-5314", }, { cve: "CVE-2016-5316", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5316", }, ], notes: [ { category: "general", text: "Out-of-bounds read in the PixarLogCleanup function in tif_pixarlog.c in libtiff 4.0.6 and earlier allows remote attackers to crash the application by sending a crafted TIFF image to the rgb2ycbcr tool.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5316", url: "https://www.suse.com/security/cve/CVE-2016-5316", }, { category: "external", summary: "SUSE Bug 984837 for CVE-2016-5316", url: "https://bugzilla.suse.com/984837", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-10-13T11:59:37Z", details: "moderate", }, ], title: "CVE-2016-5316", }, { cve: "CVE-2016-5317", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5317", }, ], notes: [ { category: "general", text: "Buffer overflow in the PixarLogDecode function in libtiff.so in the PixarLogDecode function in libtiff 4.0.6 and earlier, as used in GNOME nautilus, allows attackers to cause a denial of service attack (crash) via a crafted TIFF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5317", url: "https://www.suse.com/security/cve/CVE-2016-5317", }, { category: "external", summary: "SUSE Bug 984842 for CVE-2016-5317", url: "https://bugzilla.suse.com/984842", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-10-13T11:59:37Z", details: "moderate", }, ], title: "CVE-2016-5317", }, { cve: "CVE-2016-5320", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5320", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-5314. Reason: This candidate is a reservation duplicate of CVE-2016-5314. Notes: All CVE users should reference CVE-2016-5314 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5320", url: "https://www.suse.com/security/cve/CVE-2016-5320", }, { category: "external", summary: "SUSE Bug 1007284 for CVE-2016-5320", url: "https://bugzilla.suse.com/1007284", }, { category: "external", summary: "SUSE Bug 984808 for CVE-2016-5320", url: "https://bugzilla.suse.com/984808", }, { category: "external", summary: "SUSE Bug 987351 for CVE-2016-5320", url: "https://bugzilla.suse.com/987351", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-10-13T11:59:37Z", details: "moderate", }, ], title: "CVE-2016-5320", }, { cve: "CVE-2016-5875", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5875", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-5314. Reason: This candidate is a reservation duplicate of CVE-2016-5314. Notes: All CVE users should reference CVE-2016-5314 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5875", url: "https://www.suse.com/security/cve/CVE-2016-5875", }, { category: "external", summary: "SUSE Bug 1007284 for CVE-2016-5875", url: "https://bugzilla.suse.com/1007284", }, { category: "external", summary: "SUSE Bug 984809 for CVE-2016-5875", url: "https://bugzilla.suse.com/984809", }, { category: "external", summary: "SUSE Bug 984831 for CVE-2016-5875", url: "https://bugzilla.suse.com/984831", }, { category: "external", summary: "SUSE Bug 987351 for CVE-2016-5875", url: "https://bugzilla.suse.com/987351", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.168.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.168.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-10-13T11:59:37Z", details: "moderate", }, ], title: "CVE-2016-5875", }, ], }
suse-su-2018:1472-1
Vulnerability from csaf_suse
Published
2018-05-30 07:08
Modified
2018-05-30 07:08
Summary
Security update for tiff
Notes
Title of the patch
Security update for tiff
Description of the patch
This update for tiff fixes the following issues:
Security issues fixed:
- CVE-2016-5315: The setByteArray function in tif_dir.c allowed remote attackers to cause a denial of service (out-of-bounds read) via a crafted tiff image. (bsc#984809)
- CVE-2016-10267: LibTIFF allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_ojpeg.c:816:8. (bsc#1017694)
- CVE-2016-10269: LibTIFF allowed remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to 'READ of size 512' and libtiff/tif_unix.c:340:2. (bsc#1031254)
- CVE-2016-10270: LibTIFF allowed remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to 'READ of size 8' and libtiff/tif_read.c:523:22. (bsc#1031250)
- CVE-2017-18013: In LibTIFF, there was a Null-Pointer Dereference in the tif_print.c TIFFPrintDirectory function, as demonstrated by a tiffinfo crash. (bsc#1074317)
- CVE-2017-7593: tif_read.c did not ensure that tif_rawdata is properly initialized, which might have allowed remote attackers to obtain sensitive information from process memory via a crafted image. (bsc#1033129)
- CVE-2017-7595: The JPEGSetupEncode function in tiff_jpeg.c allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image. (bsc#1033127)
- CVE-2017-7596: LibTIFF had an 'outside the range of representable values of type float' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. (bsc#1033126)
- CVE-2017-7597: tif_dirread.c had an 'outside the range of representable values of type float' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. (bsc#1033120)
- CVE-2017-7599: LibTIFF had an 'outside the range of representable values of type short' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. (bsc#1033113)
- CVE-2017-7600: LibTIFF had an 'outside the range of representable values of type unsigned char' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. (bsc#1033112)
- CVE-2017-7601: LibTIFF had a 'shift exponent too large for 64-bit type long' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. (bsc#1033111)
- CVE-2017-7602: LibTIFF had a signed integer overflow, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. (bsc#1033109)
- Multiple divide by zero issues
- CVE-2016-5314: Buffer overflow in the PixarLogDecode function in tif_pixarlog.c allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr. (bsc#987351 bsc#984808 bsc#984831)
Patchnames
sdksp4-tiff-13631,slessp4-tiff-13631
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for tiff", title: "Title of the patch", }, { category: "description", text: "This update for tiff fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2016-5315: The setByteArray function in tif_dir.c allowed remote attackers to cause a denial of service (out-of-bounds read) via a crafted tiff image. (bsc#984809)\n- CVE-2016-10267: LibTIFF allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_ojpeg.c:816:8. (bsc#1017694)\n- CVE-2016-10269: LibTIFF allowed remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to 'READ of size 512' and libtiff/tif_unix.c:340:2. (bsc#1031254)\n- CVE-2016-10270: LibTIFF allowed remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to 'READ of size 8' and libtiff/tif_read.c:523:22. (bsc#1031250)\n- CVE-2017-18013: In LibTIFF, there was a Null-Pointer Dereference in the tif_print.c TIFFPrintDirectory function, as demonstrated by a tiffinfo crash. (bsc#1074317)\n- CVE-2017-7593: tif_read.c did not ensure that tif_rawdata is properly initialized, which might have allowed remote attackers to obtain sensitive information from process memory via a crafted image. (bsc#1033129)\n- CVE-2017-7595: The JPEGSetupEncode function in tiff_jpeg.c allowed remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image. (bsc#1033127)\n- CVE-2017-7596: LibTIFF had an 'outside the range of representable values of type float' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. (bsc#1033126)\n- CVE-2017-7597: tif_dirread.c had an 'outside the range of representable values of type float' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. (bsc#1033120)\n- CVE-2017-7599: LibTIFF had an 'outside the range of representable values of type short' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. (bsc#1033113)\n- CVE-2017-7600: LibTIFF had an 'outside the range of representable values of type unsigned char' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. (bsc#1033112)\n- CVE-2017-7601: LibTIFF had a 'shift exponent too large for 64-bit type long' undefined behavior issue, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. (bsc#1033111)\n- CVE-2017-7602: LibTIFF had a signed integer overflow, which might have allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. (bsc#1033109)\n- Multiple divide by zero issues\n- CVE-2016-5314: Buffer overflow in the PixarLogDecode function in tif_pixarlog.c allowed remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr. (bsc#987351 bsc#984808 bsc#984831)\n", title: "Description of the patch", }, { category: "details", text: "sdksp4-tiff-13631,slessp4-tiff-13631", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1472-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:1472-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20181472-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:1472-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html", }, { category: "self", summary: "SUSE Bug 1017694", url: "https://bugzilla.suse.com/1017694", }, { category: "self", summary: "SUSE Bug 1031250", url: "https://bugzilla.suse.com/1031250", }, { category: "self", summary: "SUSE Bug 1031254", url: "https://bugzilla.suse.com/1031254", }, { category: "self", summary: "SUSE Bug 1033109", url: "https://bugzilla.suse.com/1033109", }, { category: "self", summary: "SUSE Bug 1033111", url: "https://bugzilla.suse.com/1033111", }, { category: "self", summary: "SUSE Bug 1033112", url: "https://bugzilla.suse.com/1033112", }, { category: "self", summary: "SUSE Bug 1033113", url: "https://bugzilla.suse.com/1033113", }, { category: "self", summary: "SUSE Bug 1033120", url: "https://bugzilla.suse.com/1033120", }, { category: "self", summary: "SUSE Bug 1033126", url: "https://bugzilla.suse.com/1033126", }, { category: "self", summary: "SUSE Bug 1033127", url: "https://bugzilla.suse.com/1033127", }, { category: "self", summary: "SUSE Bug 1033129", url: "https://bugzilla.suse.com/1033129", }, { category: "self", summary: "SUSE Bug 1074317", url: "https://bugzilla.suse.com/1074317", }, { category: "self", summary: "SUSE Bug 984808", url: "https://bugzilla.suse.com/984808", }, { category: "self", summary: "SUSE Bug 984809", url: "https://bugzilla.suse.com/984809", }, { category: "self", summary: "SUSE Bug 984831", url: "https://bugzilla.suse.com/984831", }, { category: "self", summary: "SUSE Bug 987351", url: "https://bugzilla.suse.com/987351", }, { category: "self", summary: "SUSE CVE CVE-2016-10267 page", url: "https://www.suse.com/security/cve/CVE-2016-10267/", }, { category: "self", summary: "SUSE CVE CVE-2016-10269 page", url: "https://www.suse.com/security/cve/CVE-2016-10269/", }, { category: "self", summary: "SUSE CVE CVE-2016-10270 page", url: "https://www.suse.com/security/cve/CVE-2016-10270/", }, { category: "self", summary: "SUSE CVE CVE-2016-5314 page", url: "https://www.suse.com/security/cve/CVE-2016-5314/", }, { category: "self", summary: "SUSE CVE CVE-2016-5315 page", url: "https://www.suse.com/security/cve/CVE-2016-5315/", }, { category: "self", summary: "SUSE CVE CVE-2017-18013 page", url: "https://www.suse.com/security/cve/CVE-2017-18013/", }, { category: "self", summary: "SUSE CVE CVE-2017-7593 page", url: "https://www.suse.com/security/cve/CVE-2017-7593/", }, { category: "self", summary: "SUSE CVE CVE-2017-7595 page", url: "https://www.suse.com/security/cve/CVE-2017-7595/", }, { category: "self", summary: "SUSE CVE CVE-2017-7596 page", url: "https://www.suse.com/security/cve/CVE-2017-7596/", }, { category: "self", summary: "SUSE CVE CVE-2017-7597 page", url: "https://www.suse.com/security/cve/CVE-2017-7597/", }, { category: "self", summary: "SUSE CVE CVE-2017-7599 page", url: "https://www.suse.com/security/cve/CVE-2017-7599/", }, { category: "self", summary: "SUSE CVE CVE-2017-7600 page", url: "https://www.suse.com/security/cve/CVE-2017-7600/", }, { category: "self", summary: "SUSE CVE CVE-2017-7601 page", url: "https://www.suse.com/security/cve/CVE-2017-7601/", }, { category: "self", summary: "SUSE CVE CVE-2017-7602 page", url: "https://www.suse.com/security/cve/CVE-2017-7602/", }, ], title: "Security update for tiff", tracking: { current_release_date: "2018-05-30T07:08:57Z", generator: { date: "2018-05-30T07:08:57Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:1472-1", initial_release_date: "2018-05-30T07:08:57Z", revision_history: [ { date: "2018-05-30T07:08:57Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libtiff-devel-3.8.2-141.169.6.1.i586", product: { name: "libtiff-devel-3.8.2-141.169.6.1.i586", product_id: "libtiff-devel-3.8.2-141.169.6.1.i586", }, }, { category: "product_version", name: "libtiff3-3.8.2-141.169.6.1.i586", product: { name: "libtiff3-3.8.2-141.169.6.1.i586", product_id: "libtiff3-3.8.2-141.169.6.1.i586", }, }, { category: "product_version", name: "tiff-3.8.2-141.169.6.1.i586", product: { name: "tiff-3.8.2-141.169.6.1.i586", product_id: "tiff-3.8.2-141.169.6.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "libtiff-devel-3.8.2-141.169.6.1.ia64", product: { name: "libtiff-devel-3.8.2-141.169.6.1.ia64", product_id: "libtiff-devel-3.8.2-141.169.6.1.ia64", }, }, { category: "product_version", name: "libtiff3-3.8.2-141.169.6.1.ia64", product: { name: "libtiff3-3.8.2-141.169.6.1.ia64", product_id: "libtiff3-3.8.2-141.169.6.1.ia64", }, }, { category: "product_version", name: "libtiff3-x86-3.8.2-141.169.6.1.ia64", product: { name: "libtiff3-x86-3.8.2-141.169.6.1.ia64", product_id: "libtiff3-x86-3.8.2-141.169.6.1.ia64", }, }, { category: "product_version", name: "tiff-3.8.2-141.169.6.1.ia64", product: { name: "tiff-3.8.2-141.169.6.1.ia64", product_id: "tiff-3.8.2-141.169.6.1.ia64", }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "libtiff-devel-3.8.2-141.169.6.1.ppc64", product: { name: "libtiff-devel-3.8.2-141.169.6.1.ppc64", product_id: "libtiff-devel-3.8.2-141.169.6.1.ppc64", }, }, { category: "product_version", name: "libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", product: { name: "libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", product_id: "libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", }, }, { category: "product_version", name: "libtiff3-3.8.2-141.169.6.1.ppc64", product: { name: "libtiff3-3.8.2-141.169.6.1.ppc64", product_id: "libtiff3-3.8.2-141.169.6.1.ppc64", }, }, { category: "product_version", name: "libtiff3-32bit-3.8.2-141.169.6.1.ppc64", product: { name: "libtiff3-32bit-3.8.2-141.169.6.1.ppc64", product_id: "libtiff3-32bit-3.8.2-141.169.6.1.ppc64", }, }, { category: "product_version", name: "tiff-3.8.2-141.169.6.1.ppc64", product: { name: "tiff-3.8.2-141.169.6.1.ppc64", product_id: "tiff-3.8.2-141.169.6.1.ppc64", }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "libtiff-devel-3.8.2-141.169.6.1.s390x", product: { name: "libtiff-devel-3.8.2-141.169.6.1.s390x", product_id: "libtiff-devel-3.8.2-141.169.6.1.s390x", }, }, { category: "product_version", name: "libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", product: { name: "libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", product_id: "libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", }, }, { category: "product_version", name: "libtiff3-3.8.2-141.169.6.1.s390x", product: { name: "libtiff3-3.8.2-141.169.6.1.s390x", product_id: "libtiff3-3.8.2-141.169.6.1.s390x", }, }, { category: "product_version", name: "libtiff3-32bit-3.8.2-141.169.6.1.s390x", product: { name: "libtiff3-32bit-3.8.2-141.169.6.1.s390x", product_id: "libtiff3-32bit-3.8.2-141.169.6.1.s390x", }, }, { category: "product_version", name: "tiff-3.8.2-141.169.6.1.s390x", product: { name: "tiff-3.8.2-141.169.6.1.s390x", product_id: "tiff-3.8.2-141.169.6.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "libtiff-devel-3.8.2-141.169.6.1.x86_64", product: { name: "libtiff-devel-3.8.2-141.169.6.1.x86_64", product_id: "libtiff-devel-3.8.2-141.169.6.1.x86_64", }, }, { category: "product_version", name: "libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", product: { name: "libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", product_id: "libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", }, }, { category: "product_version", name: "libtiff3-3.8.2-141.169.6.1.x86_64", product: { name: "libtiff3-3.8.2-141.169.6.1.x86_64", product_id: "libtiff3-3.8.2-141.169.6.1.x86_64", }, }, { category: "product_version", name: "libtiff3-32bit-3.8.2-141.169.6.1.x86_64", product: { name: "libtiff3-32bit-3.8.2-141.169.6.1.x86_64", product_id: "libtiff3-32bit-3.8.2-141.169.6.1.x86_64", }, }, { category: "product_version", name: "tiff-3.8.2-141.169.6.1.x86_64", product: { name: "tiff-3.8.2-141.169.6.1.x86_64", product_id: "tiff-3.8.2-141.169.6.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 11 SP4", product: { name: "SUSE Linux Enterprise Software Development Kit 11 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 11 SP4", product_identification_helper: { cpe: "cpe:/a:suse:sle-sdk:11:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 11 SP4", product: { name: "SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4", product_identification_helper: { cpe: "cpe:/o:suse:suse_sles:11:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:11:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libtiff-devel-3.8.2-141.169.6.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", }, product_reference: "libtiff-devel-3.8.2-141.169.6.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-3.8.2-141.169.6.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", }, product_reference: "libtiff-devel-3.8.2-141.169.6.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-3.8.2-141.169.6.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", }, product_reference: "libtiff-devel-3.8.2-141.169.6.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-3.8.2-141.169.6.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", }, product_reference: "libtiff-devel-3.8.2-141.169.6.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-3.8.2-141.169.6.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", }, product_reference: "libtiff-devel-3.8.2-141.169.6.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", }, product_reference: "libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-32bit-3.8.2-141.169.6.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", }, product_reference: "libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", }, product_reference: "libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-3.8.2-141.169.6.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", }, product_reference: "libtiff3-3.8.2-141.169.6.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-3.8.2-141.169.6.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", }, product_reference: "libtiff3-3.8.2-141.169.6.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-3.8.2-141.169.6.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", }, product_reference: "libtiff3-3.8.2-141.169.6.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-3.8.2-141.169.6.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", }, product_reference: "libtiff3-3.8.2-141.169.6.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-3.8.2-141.169.6.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", }, product_reference: "libtiff3-3.8.2-141.169.6.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-32bit-3.8.2-141.169.6.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", }, product_reference: "libtiff3-32bit-3.8.2-141.169.6.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-32bit-3.8.2-141.169.6.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", }, product_reference: "libtiff3-32bit-3.8.2-141.169.6.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-32bit-3.8.2-141.169.6.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", }, product_reference: "libtiff3-32bit-3.8.2-141.169.6.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-x86-3.8.2-141.169.6.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", }, product_reference: "libtiff3-x86-3.8.2-141.169.6.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "tiff-3.8.2-141.169.6.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", }, product_reference: "tiff-3.8.2-141.169.6.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "tiff-3.8.2-141.169.6.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", }, product_reference: "tiff-3.8.2-141.169.6.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "tiff-3.8.2-141.169.6.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", }, product_reference: "tiff-3.8.2-141.169.6.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "tiff-3.8.2-141.169.6.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", }, product_reference: "tiff-3.8.2-141.169.6.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "tiff-3.8.2-141.169.6.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", }, product_reference: "tiff-3.8.2-141.169.6.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-3.8.2-141.169.6.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", }, product_reference: "libtiff3-3.8.2-141.169.6.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-3.8.2-141.169.6.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", }, product_reference: "libtiff3-3.8.2-141.169.6.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-3.8.2-141.169.6.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", }, product_reference: "libtiff3-3.8.2-141.169.6.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-3.8.2-141.169.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", }, product_reference: "libtiff3-3.8.2-141.169.6.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-3.8.2-141.169.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", }, product_reference: "libtiff3-3.8.2-141.169.6.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-32bit-3.8.2-141.169.6.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", }, product_reference: "libtiff3-32bit-3.8.2-141.169.6.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-32bit-3.8.2-141.169.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", }, product_reference: "libtiff3-32bit-3.8.2-141.169.6.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-32bit-3.8.2-141.169.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", }, product_reference: "libtiff3-32bit-3.8.2-141.169.6.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "libtiff3-x86-3.8.2-141.169.6.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", }, product_reference: "libtiff3-x86-3.8.2-141.169.6.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "tiff-3.8.2-141.169.6.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", }, product_reference: "tiff-3.8.2-141.169.6.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "tiff-3.8.2-141.169.6.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", }, product_reference: "tiff-3.8.2-141.169.6.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "tiff-3.8.2-141.169.6.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", }, product_reference: "tiff-3.8.2-141.169.6.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "tiff-3.8.2-141.169.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", }, product_reference: "tiff-3.8.2-141.169.6.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "tiff-3.8.2-141.169.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", }, product_reference: "tiff-3.8.2-141.169.6.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, ], }, vulnerabilities: [ { cve: "CVE-2016-10267", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-10267", }, ], notes: [ { category: "general", text: "LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_ojpeg.c:816:8.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-10267", url: "https://www.suse.com/security/cve/CVE-2016-10267", }, { category: "external", summary: "SUSE Bug 1017694 for CVE-2016-10267", url: "https://bugzilla.suse.com/1017694", }, { category: "external", summary: "SUSE Bug 1031262 for CVE-2016-10267", url: "https://bugzilla.suse.com/1031262", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-05-30T07:08:57Z", details: "moderate", }, ], title: "CVE-2016-10267", }, { cve: "CVE-2016-10269", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-10269", }, ], notes: [ { category: "general", text: "LibTIFF 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6 and 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to \"READ of size 512\" and libtiff/tif_unix.c:340:2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-10269", url: "https://www.suse.com/security/cve/CVE-2016-10269", }, { category: "external", summary: "SUSE Bug 1017693 for CVE-2016-10269", url: "https://bugzilla.suse.com/1017693", }, { category: "external", summary: "SUSE Bug 1031254 for CVE-2016-10269", url: "https://bugzilla.suse.com/1031254", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-05-30T07:08:57Z", details: "moderate", }, ], title: "CVE-2016-10269", }, { cve: "CVE-2016-10270", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-10270", }, ], notes: [ { category: "general", text: "LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to \"READ of size 8\" and libtiff/tif_read.c:523:22.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-10270", url: "https://www.suse.com/security/cve/CVE-2016-10270", }, { category: "external", summary: "SUSE Bug 1031250 for CVE-2016-10270", url: "https://bugzilla.suse.com/1031250", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-05-30T07:08:57Z", details: "moderate", }, ], title: "CVE-2016-10270", }, { cve: "CVE-2016-5314", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5314", }, ], notes: [ { category: "general", text: "Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5314", url: "https://www.suse.com/security/cve/CVE-2016-5314", }, { category: "external", summary: "SUSE Bug 984831 for CVE-2016-5314", url: "https://bugzilla.suse.com/984831", }, { category: "external", summary: "SUSE Bug 987351 for CVE-2016-5314", url: "https://bugzilla.suse.com/987351", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-05-30T07:08:57Z", details: "moderate", }, ], title: "CVE-2016-5314", }, { cve: "CVE-2016-5315", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5315", }, ], notes: [ { category: "general", text: "The setByteArray function in tif_dir.c in libtiff 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted tiff image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5315", url: "https://www.suse.com/security/cve/CVE-2016-5315", }, { category: "external", summary: "SUSE Bug 984809 for CVE-2016-5315", url: "https://bugzilla.suse.com/984809", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-05-30T07:08:57Z", details: "moderate", }, ], title: "CVE-2016-5315", }, { cve: "CVE-2017-18013", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-18013", }, ], notes: [ { category: "general", text: "In LibTIFF 4.0.9, there is a Null-Pointer Dereference in the tif_print.c TIFFPrintDirectory function, as demonstrated by a tiffinfo crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-18013", url: "https://www.suse.com/security/cve/CVE-2017-18013", }, { category: "external", summary: "SUSE Bug 1074317 for CVE-2017-18013", url: "https://bugzilla.suse.com/1074317", }, { category: "external", summary: "SUSE Bug 1082825 for CVE-2017-18013", url: "https://bugzilla.suse.com/1082825", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-05-30T07:08:57Z", details: "important", }, ], title: "CVE-2017-18013", }, { cve: "CVE-2017-7593", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7593", }, ], notes: [ { category: "general", text: "tif_read.c in LibTIFF 4.0.7 does not ensure that tif_rawdata is properly initialized, which might allow remote attackers to obtain sensitive information from process memory via a crafted image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7593", url: "https://www.suse.com/security/cve/CVE-2017-7593", }, { category: "external", summary: "SUSE Bug 1033129 for CVE-2017-7593", url: "https://bugzilla.suse.com/1033129", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-05-30T07:08:57Z", details: "moderate", }, ], title: "CVE-2017-7593", }, { cve: "CVE-2017-7595", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7595", }, ], notes: [ { category: "general", text: "The JPEGSetupEncode function in tiff_jpeg.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7595", url: "https://www.suse.com/security/cve/CVE-2017-7595", }, { category: "external", summary: "SUSE Bug 1033111 for CVE-2017-7595", url: "https://bugzilla.suse.com/1033111", }, { category: "external", summary: "SUSE Bug 1033127 for CVE-2017-7595", url: "https://bugzilla.suse.com/1033127", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-05-30T07:08:57Z", details: "moderate", }, ], title: "CVE-2017-7595", }, { cve: "CVE-2017-7596", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7596", }, ], notes: [ { category: "general", text: "LibTIFF 4.0.7 has an \"outside the range of representable values of type float\" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7596", url: "https://www.suse.com/security/cve/CVE-2017-7596", }, { category: "external", summary: "SUSE Bug 1033112 for CVE-2017-7596", url: "https://bugzilla.suse.com/1033112", }, { category: "external", summary: "SUSE Bug 1033113 for CVE-2017-7596", url: "https://bugzilla.suse.com/1033113", }, { category: "external", summary: "SUSE Bug 1033120 for CVE-2017-7596", url: "https://bugzilla.suse.com/1033120", }, { category: "external", summary: "SUSE Bug 1033126 for CVE-2017-7596", url: "https://bugzilla.suse.com/1033126", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-05-30T07:08:57Z", details: "important", }, ], title: "CVE-2017-7596", }, { cve: "CVE-2017-7597", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7597", }, ], notes: [ { category: "general", text: "tif_dirread.c in LibTIFF 4.0.7 has an \"outside the range of representable values of type float\" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7597", url: "https://www.suse.com/security/cve/CVE-2017-7597", }, { category: "external", summary: "SUSE Bug 1033112 for CVE-2017-7597", url: "https://bugzilla.suse.com/1033112", }, { category: "external", summary: "SUSE Bug 1033113 for CVE-2017-7597", url: "https://bugzilla.suse.com/1033113", }, { category: "external", summary: "SUSE Bug 1033120 for CVE-2017-7597", url: "https://bugzilla.suse.com/1033120", }, { category: "external", summary: "SUSE Bug 1033126 for CVE-2017-7597", url: "https://bugzilla.suse.com/1033126", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-05-30T07:08:57Z", details: "moderate", }, ], title: "CVE-2017-7597", }, { cve: "CVE-2017-7599", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7599", }, ], notes: [ { category: "general", text: "LibTIFF 4.0.7 has an \"outside the range of representable values of type short\" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7599", url: "https://www.suse.com/security/cve/CVE-2017-7599", }, { category: "external", summary: "SUSE Bug 1033112 for CVE-2017-7599", url: "https://bugzilla.suse.com/1033112", }, { category: "external", summary: "SUSE Bug 1033113 for CVE-2017-7599", url: "https://bugzilla.suse.com/1033113", }, { category: "external", summary: "SUSE Bug 1033120 for CVE-2017-7599", url: "https://bugzilla.suse.com/1033120", }, { category: "external", summary: "SUSE Bug 1033126 for CVE-2017-7599", url: "https://bugzilla.suse.com/1033126", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-05-30T07:08:57Z", details: "moderate", }, ], title: "CVE-2017-7599", }, { cve: "CVE-2017-7600", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7600", }, ], notes: [ { category: "general", text: "LibTIFF 4.0.7 has an \"outside the range of representable values of type unsigned char\" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7600", url: "https://www.suse.com/security/cve/CVE-2017-7600", }, { category: "external", summary: "SUSE Bug 1033112 for CVE-2017-7600", url: "https://bugzilla.suse.com/1033112", }, { category: "external", summary: "SUSE Bug 1033113 for CVE-2017-7600", url: "https://bugzilla.suse.com/1033113", }, { category: "external", summary: "SUSE Bug 1033120 for CVE-2017-7600", url: "https://bugzilla.suse.com/1033120", }, { category: "external", summary: "SUSE Bug 1033126 for CVE-2017-7600", url: "https://bugzilla.suse.com/1033126", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-05-30T07:08:57Z", details: "low", }, ], title: "CVE-2017-7600", }, { cve: "CVE-2017-7601", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7601", }, ], notes: [ { category: "general", text: "LibTIFF 4.0.7 has a \"shift exponent too large for 64-bit type long\" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7601", url: "https://www.suse.com/security/cve/CVE-2017-7601", }, { category: "external", summary: "SUSE Bug 1033111 for CVE-2017-7601", url: "https://bugzilla.suse.com/1033111", }, { category: "external", summary: "SUSE Bug 1033127 for CVE-2017-7601", url: "https://bugzilla.suse.com/1033127", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-05-30T07:08:57Z", details: "low", }, ], title: "CVE-2017-7601", }, { cve: "CVE-2017-7602", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7602", }, ], notes: [ { category: "general", text: "LibTIFF 4.0.7 has a signed integer overflow, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7602", url: "https://www.suse.com/security/cve/CVE-2017-7602", }, { category: "external", summary: "SUSE Bug 1033109 for CVE-2017-7602", url: "https://bugzilla.suse.com/1033109", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-32bit-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libtiff3-x86-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:tiff-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-3.8.2-141.169.6.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libtiff-devel-32bit-3.8.2-141.169.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-05-30T07:08:57Z", details: "moderate", }, ], title: "CVE-2017-7602", }, ], }
suse-su-2016:2271-1
Vulnerability from csaf_suse
Published
2016-09-09 07:01
Modified
2016-09-09 07:01
Summary
Security update for tiff
Notes
Title of the patch
Security update for tiff
Description of the patch
This update for tiff fixes the following issues:
* CVE-2015-8781, CVE-2015-8782, CVE-2015-8783: Out-of-bounds writes for invalid images (bsc#964225)
* CVE-2016-3186: Buffer overflow in gif2tiff (bnc#973340).
* CVE-2016-5875: heap-based buffer overflow when using the PixarLog compressionformat (bsc#987351)
* CVE-2016-5316: Out-of-bounds read in PixarLogCleanup() function in tif_pixarlog.c (bsc#984837)
* CVE-2016-5314: Out-of-bounds write in PixarLogDecode() function (bsc#984831)
* CVE-2016-5317: Out-of-bounds write in PixarLogDecode() function in libtiff.so (bsc#984842)
* CVE-2016-5320: Out-of-bounds write in PixarLogDecode() function in tif_pixarlog.c (bsc#984808)
Patchnames
SUSE-SLE-DESKTOP-12-SP1-2016-1330,SUSE-SLE-SDK-12-SP1-2016-1330,SUSE-SLE-SERVER-12-SP1-2016-1330
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for tiff", title: "Title of the patch", }, { category: "description", text: "\nThis update for tiff fixes the following issues:\n\n* CVE-2015-8781, CVE-2015-8782, CVE-2015-8783: Out-of-bounds writes for invalid images (bsc#964225)\n* CVE-2016-3186: Buffer overflow in gif2tiff (bnc#973340).\n* CVE-2016-5875: heap-based buffer overflow when using the PixarLog compressionformat (bsc#987351)\n* CVE-2016-5316: Out-of-bounds read in PixarLogCleanup() function in tif_pixarlog.c (bsc#984837)\n* CVE-2016-5314: Out-of-bounds write in PixarLogDecode() function (bsc#984831)\n* CVE-2016-5317: Out-of-bounds write in PixarLogDecode() function in libtiff.so (bsc#984842)\n* CVE-2016-5320: Out-of-bounds write in PixarLogDecode() function in tif_pixarlog.c (bsc#984808) \n\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-DESKTOP-12-SP1-2016-1330,SUSE-SLE-SDK-12-SP1-2016-1330,SUSE-SLE-SERVER-12-SP1-2016-1330", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2271-1.json", }, { category: "self", summary: "URL for SUSE-SU-2016:2271-1", url: "https://www.suse.com/support/update/announcement/2016/suse-su-20162271-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2016:2271-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2016-September/002264.html", }, { category: "self", summary: "SUSE Bug 964225", url: "https://bugzilla.suse.com/964225", }, { category: "self", summary: "SUSE Bug 973340", url: "https://bugzilla.suse.com/973340", }, { category: "self", summary: "SUSE Bug 984808", url: "https://bugzilla.suse.com/984808", }, { category: "self", summary: "SUSE Bug 984831", url: "https://bugzilla.suse.com/984831", }, { category: "self", summary: "SUSE Bug 984837", url: "https://bugzilla.suse.com/984837", }, { category: "self", summary: "SUSE Bug 984842", url: "https://bugzilla.suse.com/984842", }, { category: "self", summary: "SUSE Bug 987351", url: "https://bugzilla.suse.com/987351", }, { category: "self", summary: "SUSE CVE CVE-2015-8781 page", url: "https://www.suse.com/security/cve/CVE-2015-8781/", }, { category: "self", summary: "SUSE CVE CVE-2015-8782 page", url: "https://www.suse.com/security/cve/CVE-2015-8782/", }, { category: "self", summary: "SUSE CVE CVE-2015-8783 page", url: "https://www.suse.com/security/cve/CVE-2015-8783/", }, { category: "self", summary: "SUSE CVE CVE-2016-3186 page", url: "https://www.suse.com/security/cve/CVE-2016-3186/", }, { category: "self", summary: "SUSE CVE CVE-2016-5314 page", url: "https://www.suse.com/security/cve/CVE-2016-5314/", }, { category: "self", summary: "SUSE CVE CVE-2016-5316 page", url: "https://www.suse.com/security/cve/CVE-2016-5316/", }, { category: "self", summary: "SUSE CVE CVE-2016-5317 page", url: "https://www.suse.com/security/cve/CVE-2016-5317/", }, { category: "self", summary: "SUSE CVE CVE-2016-5320 page", url: "https://www.suse.com/security/cve/CVE-2016-5320/", }, { category: "self", summary: "SUSE CVE CVE-2016-5875 page", url: "https://www.suse.com/security/cve/CVE-2016-5875/", }, ], title: "Security update for tiff", tracking: { current_release_date: "2016-09-09T07:01:46Z", generator: { date: "2016-09-09T07:01:46Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2016:2271-1", initial_release_date: "2016-09-09T07:01:46Z", revision_history: [ { date: "2016-09-09T07:01:46Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libtiff-devel-4.0.6-26.3.ppc64le", product: { name: "libtiff-devel-4.0.6-26.3.ppc64le", product_id: "libtiff-devel-4.0.6-26.3.ppc64le", }, }, { category: "product_version", name: "libtiff5-4.0.6-26.3.ppc64le", product: { name: "libtiff5-4.0.6-26.3.ppc64le", product_id: "libtiff5-4.0.6-26.3.ppc64le", }, }, { category: "product_version", name: "tiff-4.0.6-26.3.ppc64le", product: { name: "tiff-4.0.6-26.3.ppc64le", product_id: "tiff-4.0.6-26.3.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "libtiff-devel-4.0.6-26.3.s390x", product: { name: "libtiff-devel-4.0.6-26.3.s390x", product_id: "libtiff-devel-4.0.6-26.3.s390x", }, }, { category: "product_version", name: "libtiff5-4.0.6-26.3.s390x", product: { name: "libtiff5-4.0.6-26.3.s390x", product_id: "libtiff5-4.0.6-26.3.s390x", }, }, { category: "product_version", name: "libtiff5-32bit-4.0.6-26.3.s390x", product: { name: "libtiff5-32bit-4.0.6-26.3.s390x", product_id: "libtiff5-32bit-4.0.6-26.3.s390x", }, }, { category: "product_version", name: "tiff-4.0.6-26.3.s390x", product: { name: "tiff-4.0.6-26.3.s390x", product_id: "tiff-4.0.6-26.3.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "libtiff5-4.0.6-26.3.x86_64", product: { name: "libtiff5-4.0.6-26.3.x86_64", product_id: "libtiff5-4.0.6-26.3.x86_64", }, }, { category: "product_version", name: "libtiff5-32bit-4.0.6-26.3.x86_64", product: { name: "libtiff5-32bit-4.0.6-26.3.x86_64", product_id: "libtiff5-32bit-4.0.6-26.3.x86_64", }, }, { category: "product_version", name: "libtiff-devel-4.0.6-26.3.x86_64", product: { name: "libtiff-devel-4.0.6-26.3.x86_64", product_id: "libtiff-devel-4.0.6-26.3.x86_64", }, }, { category: "product_version", name: "tiff-4.0.6-26.3.x86_64", product: { name: "tiff-4.0.6-26.3.x86_64", product_id: "tiff-4.0.6-26.3.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Desktop 12 SP1", product: { name: "SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sled:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP1", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP1", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP1", product: { name: "SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.6-26.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.6-26.3.x86_64", }, product_reference: "libtiff5-4.0.6-26.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libtiff5-32bit-4.0.6-26.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", }, product_reference: "libtiff5-32bit-4.0.6-26.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-4.0.6-26.3.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.ppc64le", }, product_reference: "libtiff-devel-4.0.6-26.3.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-4.0.6-26.3.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.s390x", }, product_reference: "libtiff-devel-4.0.6-26.3.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-4.0.6-26.3.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.x86_64", }, product_reference: "libtiff-devel-4.0.6-26.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.6-26.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.ppc64le", }, product_reference: "libtiff5-4.0.6-26.3.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.6-26.3.s390x as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.s390x", }, product_reference: "libtiff5-4.0.6-26.3.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.6-26.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.x86_64", }, product_reference: "libtiff5-4.0.6-26.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libtiff5-32bit-4.0.6-26.3.s390x as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", }, product_reference: "libtiff5-32bit-4.0.6-26.3.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libtiff5-32bit-4.0.6-26.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", }, product_reference: "libtiff5-32bit-4.0.6-26.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "tiff-4.0.6-26.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.ppc64le", }, product_reference: "tiff-4.0.6-26.3.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "tiff-4.0.6-26.3.s390x as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.s390x", }, product_reference: "tiff-4.0.6-26.3.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "tiff-4.0.6-26.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.x86_64", }, product_reference: "tiff-4.0.6-26.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.6-26.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.ppc64le", }, product_reference: "libtiff5-4.0.6-26.3.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.6-26.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.s390x", }, product_reference: "libtiff5-4.0.6-26.3.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.6-26.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.x86_64", }, product_reference: "libtiff5-4.0.6-26.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libtiff5-32bit-4.0.6-26.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", }, product_reference: "libtiff5-32bit-4.0.6-26.3.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libtiff5-32bit-4.0.6-26.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", }, product_reference: "libtiff5-32bit-4.0.6-26.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "tiff-4.0.6-26.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.ppc64le", }, product_reference: "tiff-4.0.6-26.3.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "tiff-4.0.6-26.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.s390x", }, product_reference: "tiff-4.0.6-26.3.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "tiff-4.0.6-26.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.x86_64", }, product_reference: "tiff-4.0.6-26.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, ], }, vulnerabilities: [ { cve: "CVE-2015-8781", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8781", }, ], notes: [ { category: "general", text: "tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds write) via an invalid number of samples per pixel in a LogL compressed TIFF image, a different vulnerability than CVE-2015-8782.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8781", url: "https://www.suse.com/security/cve/CVE-2015-8781", }, { category: "external", summary: "SUSE Bug 964213 for CVE-2015-8781", url: "https://bugzilla.suse.com/964213", }, { category: "external", summary: "SUSE Bug 964225 for CVE-2015-8781", url: "https://bugzilla.suse.com/964225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-09-09T07:01:46Z", details: "moderate", }, ], title: "CVE-2015-8781", }, { cve: "CVE-2015-8782", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8782", }, ], notes: [ { category: "general", text: "tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds writes) via a crafted TIFF image, a different vulnerability than CVE-2015-8781.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8782", url: "https://www.suse.com/security/cve/CVE-2015-8782", }, { category: "external", summary: "SUSE Bug 964213 for CVE-2015-8782", url: "https://bugzilla.suse.com/964213", }, { category: "external", summary: "SUSE Bug 964225 for CVE-2015-8782", url: "https://bugzilla.suse.com/964225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-09-09T07:01:46Z", details: "moderate", }, ], title: "CVE-2015-8782", }, { cve: "CVE-2015-8783", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8783", }, ], notes: [ { category: "general", text: "tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds reads) via a crafted TIFF image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8783", url: "https://www.suse.com/security/cve/CVE-2015-8783", }, { category: "external", summary: "SUSE Bug 964213 for CVE-2015-8783", url: "https://bugzilla.suse.com/964213", }, { category: "external", summary: "SUSE Bug 964225 for CVE-2015-8783", url: "https://bugzilla.suse.com/964225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-09-09T07:01:46Z", details: "moderate", }, ], title: "CVE-2015-8783", }, { cve: "CVE-2016-3186", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3186", }, ], notes: [ { category: "general", text: "Buffer overflow in the readextension function in gif2tiff.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (application crash) via a crafted GIF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3186", url: "https://www.suse.com/security/cve/CVE-2016-3186", }, { category: "external", summary: "SUSE Bug 973340 for CVE-2016-3186", url: "https://bugzilla.suse.com/973340", }, { category: "external", summary: "SUSE Bug 983268 for CVE-2016-3186", url: "https://bugzilla.suse.com/983268", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-09-09T07:01:46Z", details: "moderate", }, ], title: "CVE-2016-3186", }, { cve: "CVE-2016-5314", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5314", }, ], notes: [ { category: "general", text: "Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5314", url: "https://www.suse.com/security/cve/CVE-2016-5314", }, { category: "external", summary: "SUSE Bug 984831 for CVE-2016-5314", url: "https://bugzilla.suse.com/984831", }, { category: "external", summary: "SUSE Bug 987351 for CVE-2016-5314", url: "https://bugzilla.suse.com/987351", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-09-09T07:01:46Z", details: "moderate", }, ], title: "CVE-2016-5314", }, { cve: "CVE-2016-5316", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5316", }, ], notes: [ { category: "general", text: "Out-of-bounds read in the PixarLogCleanup function in tif_pixarlog.c in libtiff 4.0.6 and earlier allows remote attackers to crash the application by sending a crafted TIFF image to the rgb2ycbcr tool.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5316", url: "https://www.suse.com/security/cve/CVE-2016-5316", }, { category: "external", summary: "SUSE Bug 984837 for CVE-2016-5316", url: "https://bugzilla.suse.com/984837", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-09-09T07:01:46Z", details: "moderate", }, ], title: "CVE-2016-5316", }, { cve: "CVE-2016-5317", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5317", }, ], notes: [ { category: "general", text: "Buffer overflow in the PixarLogDecode function in libtiff.so in the PixarLogDecode function in libtiff 4.0.6 and earlier, as used in GNOME nautilus, allows attackers to cause a denial of service attack (crash) via a crafted TIFF file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5317", url: "https://www.suse.com/security/cve/CVE-2016-5317", }, { category: "external", summary: "SUSE Bug 984842 for CVE-2016-5317", url: "https://bugzilla.suse.com/984842", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-09-09T07:01:46Z", details: "moderate", }, ], title: "CVE-2016-5317", }, { cve: "CVE-2016-5320", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5320", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-5314. Reason: This candidate is a reservation duplicate of CVE-2016-5314. Notes: All CVE users should reference CVE-2016-5314 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5320", url: "https://www.suse.com/security/cve/CVE-2016-5320", }, { category: "external", summary: "SUSE Bug 1007284 for CVE-2016-5320", url: "https://bugzilla.suse.com/1007284", }, { category: "external", summary: "SUSE Bug 984808 for CVE-2016-5320", url: "https://bugzilla.suse.com/984808", }, { category: "external", summary: "SUSE Bug 987351 for CVE-2016-5320", url: "https://bugzilla.suse.com/987351", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-09-09T07:01:46Z", details: "moderate", }, ], title: "CVE-2016-5320", }, { cve: "CVE-2016-5875", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5875", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-5314. Reason: This candidate is a reservation duplicate of CVE-2016-5314. Notes: All CVE users should reference CVE-2016-5314 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5875", url: "https://www.suse.com/security/cve/CVE-2016-5875", }, { category: "external", summary: "SUSE Bug 1007284 for CVE-2016-5875", url: "https://bugzilla.suse.com/1007284", }, { category: "external", summary: "SUSE Bug 984809 for CVE-2016-5875", url: "https://bugzilla.suse.com/984809", }, { category: "external", summary: "SUSE Bug 984831 for CVE-2016-5875", url: "https://bugzilla.suse.com/984831", }, { category: "external", summary: "SUSE Bug 987351 for CVE-2016-5875", url: "https://bugzilla.suse.com/987351", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.6-26.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.6-26.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-09-09T07:01:46Z", details: "moderate", }, ], title: "CVE-2016-5875", }, ], }
WID-SEC-W-2023-2409
Vulnerability from csaf_certbund
Published
2016-06-14 22:00
Modified
2023-10-08 22:00
Summary
libTIFF: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
libTIFF ist ein Softwarepaket für die Verarbeitung von Bilddateien in Tag Image File Format (TIFF).
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in libTIFF ausnutzen, um beliebigen Programmcode mit den Rechten des Dienstes auszuführen oder um einen Denial of Service Zustand hervorzurufen.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "libTIFF ist ein Softwarepaket für die Verarbeitung von Bilddateien in Tag Image File Format (TIFF).", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in libTIFF ausnutzen, um beliebigen Programmcode mit den Rechten des Dienstes auszuführen oder um einen Denial of Service Zustand hervorzurufen.", title: "Angriff", }, { category: "general", text: "- UNIX\n- Linux\n- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-2409 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2016/wid-sec-w-2023-2409.json", }, { category: "self", summary: "WID-SEC-2023-2409 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2409", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2023-1855 vom 2023-10-06", url: "https://alas.aws.amazon.com/ALAS-2023-1855.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS2-2023-2263 vom 2023-09-21", url: "https://alas.aws.amazon.com/AL2/ALAS-2023-2263.html", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/1", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/2", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/3", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/5", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/6", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/7", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/8", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/9", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2016:1546 vom 2016-08-03", url: "https://rhn.redhat.com/errata/RHSA-2016-1546.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2016:1547 vom 2016-08-03", url: "https://rhn.redhat.com/errata/RHSA-2016-1547.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2016:2271-1 vom 2016-09-10", url: "https://www.suse.com/support/update/announcement/2016/suse-su-20162271-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2016:2527-1 vom 2016-10-13", url: "https://www.suse.com/support/update/announcement/2016/suse-su-20162527-1.html", }, { category: "external", summary: "F5 Security Advisory SOL89096577 vom 2016-11-08", url: "https://support.f5.com/kb/en-us/solutions/public/k/89/sol89096577.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2016:3301-1 vom 2016-12-30", url: "https://www.suse.com/support/update/announcement/2016/suse-su-20163301-1.html", }, { category: "external", summary: "Debian Security Advisory DSA-3762 vom 2017-01-14", url: "https://www.debian.org/security/2017/dsa-3762", }, { category: "external", summary: "Ubuntu Security Notice USN-3212-1 vom 2017-02-27", url: "http://www.ubuntu.com/usn/usn-3212-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-3212-2 vom 2017-05-30", url: "http://www.ubuntu.com/usn/usn-3212-2/", }, { category: "external", summary: "Ubuntu Security Notice USN-3212-3 vom 2017-07-19", url: "http://www.ubuntu.com/usn/usn-3212-3/", }, { category: "external", summary: "Ubuntu Security Notice USN-3212-4 vom 2017-08-07", url: "http://www.ubuntu.com/usn/usn-3212-4/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2018:1472-1 vom 2018-05-31", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20181472-1.html", }, { category: "external", summary: "Juniper Security Advisory JSA11023 vom 2020-07-08", url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA11023", }, ], source_lang: "en-US", title: "libTIFF: Mehrere Schwachstellen", tracking: { current_release_date: "2023-10-08T22:00:00.000+00:00", generator: { date: "2024-08-15T17:58:41.982+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-2409", initial_release_date: "2016-06-14T22:00:00.000+00:00", revision_history: [ { date: "2016-06-14T22:00:00.000+00:00", number: "1", summary: "Initial Release", }, { date: "2016-06-14T22:00:00.000+00:00", number: "2", summary: "Version nicht vorhanden", }, { date: "2016-06-14T22:00:00.000+00:00", number: "3", summary: "Version nicht vorhanden", }, { date: "2016-08-02T22:00:00.000+00:00", number: "4", summary: "New remediations available", }, { date: "2016-08-02T22:00:00.000+00:00", number: "5", summary: "Version nicht vorhanden", }, { date: "2016-08-02T22:00:00.000+00:00", number: "6", summary: "Version nicht vorhanden", }, { date: "2016-08-02T22:00:00.000+00:00", number: "7", summary: "Version nicht vorhanden", }, { date: "2016-09-11T22:00:00.000+00:00", number: "8", summary: "New remediations available", }, { date: "2016-10-13T22:00:00.000+00:00", number: "9", summary: "New remediations available", }, { date: "2016-11-08T23:00:00.000+00:00", number: "10", summary: "New remediations available", }, { date: "2016-11-08T23:00:00.000+00:00", number: "11", summary: "Version nicht vorhanden", }, { date: "2016-12-29T23:00:00.000+00:00", number: "12", summary: "New remediations available", }, { date: "2017-01-15T23:00:00.000+00:00", number: "13", summary: "New remediations available", }, { date: "2017-02-27T23:00:00.000+00:00", number: "14", summary: "New remediations available", }, { date: "2017-05-30T22:00:00.000+00:00", number: "15", summary: "New remediations available", }, { date: "2017-07-19T22:00:00.000+00:00", number: "16", summary: "New remediations available", }, { date: "2017-08-07T22:00:00.000+00:00", number: "17", summary: "New remediations available", }, { date: "2018-05-31T22:00:00.000+00:00", number: "18", summary: "New remediations available", }, { date: "2020-07-08T22:00:00.000+00:00", number: "19", summary: "Neue Updates von Juniper aufgenommen", }, { date: "2023-09-20T22:00:00.000+00:00", number: "20", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2023-10-08T22:00:00.000+00:00", number: "21", summary: "Neue Updates von Amazon aufgenommen", }, ], status: "final", version: "21", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "F5 WebAccelerator", product: { name: "F5 WebAccelerator", product_id: "T001723", product_identification_helper: { cpe: "cpe:/h:f5:big-ip_webaccelerator:-", }, }, }, ], category: "vendor", name: "F5", }, { branches: [ { category: "product_name", name: "Juniper Junos Space < 20.1R1", product: { name: "Juniper Junos Space < 20.1R1", product_id: "T016874", product_identification_helper: { cpe: "cpe:/a:juniper:junos_space:20.1r1", }, }, }, ], category: "vendor", name: "Juniper", }, { branches: [ { category: "product_name", name: "Open Source CentOS", product: { name: "Open Source CentOS", product_id: "1727", product_identification_helper: { cpe: "cpe:/o:centos:centos:-", }, }, }, { category: "product_name", name: "Open Source libTIFF <= 4.0.6", product: { name: "Open Source libTIFF <= 4.0.6", product_id: "T006693", product_identification_helper: { cpe: "cpe:/a:libtiff:libtiff:4.0.6", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2016-5314", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5314", }, { cve: "CVE-2016-5315", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5315", }, { cve: "CVE-2016-5316", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5316", }, { cve: "CVE-2016-5317", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5317", }, { cve: "CVE-2016-5320", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5320", }, { cve: "CVE-2016-5321", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5321", }, { cve: "CVE-2016-5322", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5322", }, { cve: "CVE-2016-5323", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5323", }, ], }
wid-sec-w-2023-2409
Vulnerability from csaf_certbund
Published
2016-06-14 22:00
Modified
2023-10-08 22:00
Summary
libTIFF: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
libTIFF ist ein Softwarepaket für die Verarbeitung von Bilddateien in Tag Image File Format (TIFF).
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in libTIFF ausnutzen, um beliebigen Programmcode mit den Rechten des Dienstes auszuführen oder um einen Denial of Service Zustand hervorzurufen.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "libTIFF ist ein Softwarepaket für die Verarbeitung von Bilddateien in Tag Image File Format (TIFF).", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in libTIFF ausnutzen, um beliebigen Programmcode mit den Rechten des Dienstes auszuführen oder um einen Denial of Service Zustand hervorzurufen.", title: "Angriff", }, { category: "general", text: "- UNIX\n- Linux\n- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-2409 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2016/wid-sec-w-2023-2409.json", }, { category: "self", summary: "WID-SEC-2023-2409 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2409", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2023-1855 vom 2023-10-06", url: "https://alas.aws.amazon.com/ALAS-2023-1855.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS2-2023-2263 vom 2023-09-21", url: "https://alas.aws.amazon.com/AL2/ALAS-2023-2263.html", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/1", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/2", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/3", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/5", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/6", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/7", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/8", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/9", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2016:1546 vom 2016-08-03", url: "https://rhn.redhat.com/errata/RHSA-2016-1546.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2016:1547 vom 2016-08-03", url: "https://rhn.redhat.com/errata/RHSA-2016-1547.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2016:2271-1 vom 2016-09-10", url: "https://www.suse.com/support/update/announcement/2016/suse-su-20162271-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2016:2527-1 vom 2016-10-13", url: "https://www.suse.com/support/update/announcement/2016/suse-su-20162527-1.html", }, { category: "external", summary: "F5 Security Advisory SOL89096577 vom 2016-11-08", url: "https://support.f5.com/kb/en-us/solutions/public/k/89/sol89096577.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2016:3301-1 vom 2016-12-30", url: "https://www.suse.com/support/update/announcement/2016/suse-su-20163301-1.html", }, { category: "external", summary: "Debian Security Advisory DSA-3762 vom 2017-01-14", url: "https://www.debian.org/security/2017/dsa-3762", }, { category: "external", summary: "Ubuntu Security Notice USN-3212-1 vom 2017-02-27", url: "http://www.ubuntu.com/usn/usn-3212-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-3212-2 vom 2017-05-30", url: "http://www.ubuntu.com/usn/usn-3212-2/", }, { category: "external", summary: "Ubuntu Security Notice USN-3212-3 vom 2017-07-19", url: "http://www.ubuntu.com/usn/usn-3212-3/", }, { category: "external", summary: "Ubuntu Security Notice USN-3212-4 vom 2017-08-07", url: "http://www.ubuntu.com/usn/usn-3212-4/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2018:1472-1 vom 2018-05-31", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20181472-1.html", }, { category: "external", summary: "Juniper Security Advisory JSA11023 vom 2020-07-08", url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA11023", }, ], source_lang: "en-US", title: "libTIFF: Mehrere Schwachstellen", tracking: { current_release_date: "2023-10-08T22:00:00.000+00:00", generator: { date: "2024-08-15T17:58:41.982+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-2409", initial_release_date: "2016-06-14T22:00:00.000+00:00", revision_history: [ { date: "2016-06-14T22:00:00.000+00:00", number: "1", summary: "Initial Release", }, { date: "2016-06-14T22:00:00.000+00:00", number: "2", summary: "Version nicht vorhanden", }, { date: "2016-06-14T22:00:00.000+00:00", number: "3", summary: "Version nicht vorhanden", }, { date: "2016-08-02T22:00:00.000+00:00", number: "4", summary: "New remediations available", }, { date: "2016-08-02T22:00:00.000+00:00", number: "5", summary: "Version nicht vorhanden", }, { date: "2016-08-02T22:00:00.000+00:00", number: "6", summary: "Version nicht vorhanden", }, { date: "2016-08-02T22:00:00.000+00:00", number: "7", summary: "Version nicht vorhanden", }, { date: "2016-09-11T22:00:00.000+00:00", number: "8", summary: "New remediations available", }, { date: "2016-10-13T22:00:00.000+00:00", number: "9", summary: "New remediations available", }, { date: "2016-11-08T23:00:00.000+00:00", number: "10", summary: "New remediations available", }, { date: "2016-11-08T23:00:00.000+00:00", number: "11", summary: "Version nicht vorhanden", }, { date: "2016-12-29T23:00:00.000+00:00", number: "12", summary: "New remediations available", }, { date: "2017-01-15T23:00:00.000+00:00", number: "13", summary: "New remediations available", }, { date: "2017-02-27T23:00:00.000+00:00", number: "14", summary: "New remediations available", }, { date: "2017-05-30T22:00:00.000+00:00", number: "15", summary: "New remediations available", }, { date: "2017-07-19T22:00:00.000+00:00", number: "16", summary: "New remediations available", }, { date: "2017-08-07T22:00:00.000+00:00", number: "17", summary: "New remediations available", }, { date: "2018-05-31T22:00:00.000+00:00", number: "18", summary: "New remediations available", }, { date: "2020-07-08T22:00:00.000+00:00", number: "19", summary: "Neue Updates von Juniper aufgenommen", }, { date: "2023-09-20T22:00:00.000+00:00", number: "20", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2023-10-08T22:00:00.000+00:00", number: "21", summary: "Neue Updates von Amazon aufgenommen", }, ], status: "final", version: "21", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "F5 WebAccelerator", product: { name: "F5 WebAccelerator", product_id: "T001723", product_identification_helper: { cpe: "cpe:/h:f5:big-ip_webaccelerator:-", }, }, }, ], category: "vendor", name: "F5", }, { branches: [ { category: "product_name", name: "Juniper Junos Space < 20.1R1", product: { name: "Juniper Junos Space < 20.1R1", product_id: "T016874", product_identification_helper: { cpe: "cpe:/a:juniper:junos_space:20.1r1", }, }, }, ], category: "vendor", name: "Juniper", }, { branches: [ { category: "product_name", name: "Open Source CentOS", product: { name: "Open Source CentOS", product_id: "1727", product_identification_helper: { cpe: "cpe:/o:centos:centos:-", }, }, }, { category: "product_name", name: "Open Source libTIFF <= 4.0.6", product: { name: "Open Source libTIFF <= 4.0.6", product_id: "T006693", product_identification_helper: { cpe: "cpe:/a:libtiff:libtiff:4.0.6", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2016-5314", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5314", }, { cve: "CVE-2016-5315", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5315", }, { cve: "CVE-2016-5316", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5316", }, { cve: "CVE-2016-5317", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5317", }, { cve: "CVE-2016-5320", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5320", }, { cve: "CVE-2016-5321", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5321", }, { cve: "CVE-2016-5322", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5322", }, { cve: "CVE-2016-5323", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5323", }, ], }
ghsa-4f32-wf2p-rq64
Vulnerability from github
Published
2022-05-14 03:33
Modified
2022-05-14 03:33
Severity ?
Details
Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.
{ affected: [], aliases: [ "CVE-2016-5314", ], database_specific: { cwe_ids: [ "CWE-787", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2018-03-12T02:29:00Z", severity: "HIGH", }, details: "Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.", id: "GHSA-4f32-wf2p-rq64", modified: "2022-05-14T03:33:16Z", published: "2022-05-14T03:33:16Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2016-5314", }, { type: "WEB", url: "https://github.com/vadz/libtiff/commit/391e77fcd217e78b2c51342ac3ddb7100ecacdd2", }, { type: "WEB", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1346687", }, { type: "WEB", url: "https://security.gentoo.org/glsa/201701-16", }, { type: "WEB", url: "https://www.debian.org/security/2017/dsa-3762", }, { type: "WEB", url: "http://bugzilla.maptools.org/show_bug.cgi?id=2554", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-updates/2016-07/msg00087.html", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2016/06/15/1", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2016/06/15/9", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2016/06/30/3", }, { type: "WEB", url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { type: "WEB", url: "http://www.securityfocus.com/bid/91195", }, { type: "WEB", url: "http://www.securityfocus.com/bid/91245", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
gsd-2016-5314
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.
Aliases
Aliases
{ GSD: { alias: "CVE-2016-5314", description: "Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.", id: "GSD-2016-5314", references: [ "https://www.suse.com/security/cve/CVE-2016-5314.html", "https://www.debian.org/security/2017/dsa-3762", "https://ubuntu.com/security/CVE-2016-5314", "https://advisories.mageia.org/CVE-2016-5314.html", "https://security.archlinux.org/CVE-2016-5314", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2016-5314", ], details: "Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.", id: "GSD-2016-5314", modified: "2023-12-13T01:21:25.333956Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-5314", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "DSA-3762", refsource: "DEBIAN", url: "https://www.debian.org/security/2017/dsa-3762", }, { name: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { name: "openSUSE-SU-2016:3035", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html", }, { name: "91195", refsource: "BID", url: "http://www.securityfocus.com/bid/91195", }, { name: "openSUSE-SU-2016:2321", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html", }, { name: "[oss-security] 20160615 CVE-2016-5314: libtiff 4.0.6 PixarLogDecode() out-of-bound writes", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/06/15/1", }, { name: "91245", refsource: "BID", url: "http://www.securityfocus.com/bid/91245", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1346687", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1346687", }, { name: "https://github.com/vadz/libtiff/commit/391e77fcd217e78b2c51342ac3ddb7100ecacdd2", refsource: "CONFIRM", url: "https://github.com/vadz/libtiff/commit/391e77fcd217e78b2c51342ac3ddb7100ecacdd2", }, { name: "GLSA-201701-16", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-16", }, { name: "openSUSE-SU-2016:1889", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-07/msg00087.html", }, { name: "openSUSE-SU-2016:2375", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html", }, { name: "[oss-security] 20160615 CVE-2016-5320: libtiff 4.0.6 rgb2ycbcr: command excution", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/06/15/9", }, { name: "[oss-security] 20160630 Re: Re: CVE request: Heap-based buffer overflow in LibTIFF when using the PixarLog compression format", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/06/30/3", }, { name: "http://bugzilla.maptools.org/show_bug.cgi?id=2554", refsource: "CONFIRM", url: "http://bugzilla.maptools.org/show_bug.cgi?id=2554", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "4.0.6", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-5314", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-787", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/vadz/libtiff/commit/391e77fcd217e78b2c51342ac3ddb7100ecacdd2", refsource: "CONFIRM", tags: [ "Patch", ], url: "https://github.com/vadz/libtiff/commit/391e77fcd217e78b2c51342ac3ddb7100ecacdd2", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1346687", refsource: "CONFIRM", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1346687", }, { name: "91195", refsource: "BID", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/91195", }, { name: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", }, { name: "[oss-security] 20160630 Re: Re: CVE request: Heap-based buffer overflow in LibTIFF when using the PixarLog compression format", refsource: "MLIST", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2016/06/30/3", }, { name: "[oss-security] 20160615 CVE-2016-5320: libtiff 4.0.6 rgb2ycbcr: command excution", refsource: "MLIST", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2016/06/15/9", }, { name: "[oss-security] 20160615 CVE-2016-5314: libtiff 4.0.6 PixarLogDecode() out-of-bound writes", refsource: "MLIST", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2016/06/15/1", }, { name: "openSUSE-SU-2016:2375", refsource: "SUSE", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html", }, { name: "openSUSE-SU-2016:2321", refsource: "SUSE", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html", }, { name: "openSUSE-SU-2016:1889", refsource: "SUSE", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-updates/2016-07/msg00087.html", }, { name: "openSUSE-SU-2016:3035", refsource: "SUSE", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html", }, { name: "http://bugzilla.maptools.org/show_bug.cgi?id=2554", refsource: "CONFIRM", tags: [ "Exploit", "Issue Tracking", ], url: "http://bugzilla.maptools.org/show_bug.cgi?id=2554", }, { name: "DSA-3762", refsource: "DEBIAN", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2017/dsa-3762", }, { name: "GLSA-201701-16", refsource: "GENTOO", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201701-16", }, { name: "91245", refsource: "BID", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/91245", }, ], }, }, impact: { baseMetricV2: { cvssV2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: true, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, }, }, lastModifiedDate: "2018-04-05T16:56Z", publishedDate: "2018-03-12T02:29Z", }, }, }
opensuse-su-2024:10554-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
libtiff-devel-32bit-4.0.7-1.1 on GA media
Notes
Title of the patch
libtiff-devel-32bit-4.0.7-1.1 on GA media
Description of the patch
These are all security issues fixed in the libtiff-devel-32bit-4.0.7-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10554
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "libtiff-devel-32bit-4.0.7-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the libtiff-devel-32bit-4.0.7-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-10554", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10554-1.json", }, { category: "self", summary: "SUSE CVE CVE-2009-2285 page", url: "https://www.suse.com/security/cve/CVE-2009-2285/", }, { category: "self", summary: "SUSE CVE CVE-2009-2347 page", url: "https://www.suse.com/security/cve/CVE-2009-2347/", }, { category: "self", summary: "SUSE CVE CVE-2010-2065 page", url: "https://www.suse.com/security/cve/CVE-2010-2065/", }, { category: "self", summary: "SUSE CVE CVE-2010-2067 page", url: "https://www.suse.com/security/cve/CVE-2010-2067/", }, { category: "self", summary: "SUSE CVE CVE-2010-2233 page", url: "https://www.suse.com/security/cve/CVE-2010-2233/", }, { category: "self", summary: "SUSE CVE CVE-2010-4665 page", url: "https://www.suse.com/security/cve/CVE-2010-4665/", }, { category: "self", summary: "SUSE CVE CVE-2011-0192 page", url: "https://www.suse.com/security/cve/CVE-2011-0192/", }, { category: "self", summary: "SUSE CVE CVE-2011-1167 page", url: "https://www.suse.com/security/cve/CVE-2011-1167/", }, { category: "self", summary: "SUSE CVE CVE-2012-1173 page", url: "https://www.suse.com/security/cve/CVE-2012-1173/", }, { category: "self", summary: "SUSE CVE CVE-2012-2113 page", url: "https://www.suse.com/security/cve/CVE-2012-2113/", }, { category: "self", summary: "SUSE CVE CVE-2012-3401 page", url: "https://www.suse.com/security/cve/CVE-2012-3401/", }, { category: "self", summary: "SUSE CVE CVE-2012-4564 page", url: "https://www.suse.com/security/cve/CVE-2012-4564/", }, { category: "self", summary: "SUSE CVE CVE-2013-1960 page", url: "https://www.suse.com/security/cve/CVE-2013-1960/", }, { category: "self", summary: "SUSE CVE CVE-2013-1961 page", url: "https://www.suse.com/security/cve/CVE-2013-1961/", }, { category: "self", summary: "SUSE CVE CVE-2013-4231 page", url: "https://www.suse.com/security/cve/CVE-2013-4231/", }, { category: "self", summary: "SUSE CVE CVE-2013-4232 page", url: "https://www.suse.com/security/cve/CVE-2013-4232/", }, { category: "self", summary: "SUSE CVE CVE-2013-4243 page", url: "https://www.suse.com/security/cve/CVE-2013-4243/", }, { category: "self", summary: "SUSE CVE CVE-2013-4244 page", url: "https://www.suse.com/security/cve/CVE-2013-4244/", }, { category: "self", summary: "SUSE CVE CVE-2014-8127 page", url: "https://www.suse.com/security/cve/CVE-2014-8127/", }, { category: "self", summary: "SUSE CVE CVE-2014-8128 page", url: "https://www.suse.com/security/cve/CVE-2014-8128/", }, { category: "self", summary: "SUSE CVE CVE-2014-8129 page", url: "https://www.suse.com/security/cve/CVE-2014-8129/", }, { category: "self", summary: "SUSE CVE CVE-2014-8130 page", url: "https://www.suse.com/security/cve/CVE-2014-8130/", }, { category: "self", summary: "SUSE CVE CVE-2014-9655 page", url: "https://www.suse.com/security/cve/CVE-2014-9655/", }, { category: "self", summary: "SUSE CVE CVE-2015-1547 page", url: "https://www.suse.com/security/cve/CVE-2015-1547/", }, { category: "self", summary: "SUSE CVE CVE-2015-7554 page", url: "https://www.suse.com/security/cve/CVE-2015-7554/", }, { category: "self", summary: "SUSE CVE CVE-2015-8665 page", url: "https://www.suse.com/security/cve/CVE-2015-8665/", }, { category: "self", summary: "SUSE CVE CVE-2015-8683 page", url: "https://www.suse.com/security/cve/CVE-2015-8683/", }, { category: "self", summary: "SUSE CVE CVE-2015-8781 page", url: "https://www.suse.com/security/cve/CVE-2015-8781/", }, { category: "self", summary: "SUSE CVE CVE-2015-8782 page", url: "https://www.suse.com/security/cve/CVE-2015-8782/", }, { category: "self", summary: "SUSE CVE CVE-2015-8783 page", url: "https://www.suse.com/security/cve/CVE-2015-8783/", }, { category: "self", summary: "SUSE CVE CVE-2016-3186 page", url: "https://www.suse.com/security/cve/CVE-2016-3186/", }, { category: "self", summary: "SUSE CVE CVE-2016-3622 page", url: "https://www.suse.com/security/cve/CVE-2016-3622/", }, { category: "self", summary: "SUSE CVE CVE-2016-3623 page", url: "https://www.suse.com/security/cve/CVE-2016-3623/", }, { category: "self", summary: "SUSE CVE CVE-2016-3658 page", url: "https://www.suse.com/security/cve/CVE-2016-3658/", }, { category: "self", summary: "SUSE CVE CVE-2016-3945 page", url: "https://www.suse.com/security/cve/CVE-2016-3945/", }, { category: "self", summary: "SUSE CVE CVE-2016-3990 page", url: "https://www.suse.com/security/cve/CVE-2016-3990/", }, { category: "self", summary: "SUSE CVE CVE-2016-3991 page", url: "https://www.suse.com/security/cve/CVE-2016-3991/", }, { category: "self", summary: "SUSE CVE CVE-2016-5314 page", url: "https://www.suse.com/security/cve/CVE-2016-5314/", }, { category: "self", summary: "SUSE CVE CVE-2016-5316 page", url: "https://www.suse.com/security/cve/CVE-2016-5316/", }, { category: "self", summary: "SUSE CVE CVE-2016-5317 page", url: "https://www.suse.com/security/cve/CVE-2016-5317/", }, { category: "self", summary: "SUSE CVE CVE-2016-5320 page", url: "https://www.suse.com/security/cve/CVE-2016-5320/", }, { category: "self", summary: "SUSE CVE CVE-2016-5321 page", url: "https://www.suse.com/security/cve/CVE-2016-5321/", }, { category: "self", summary: "SUSE CVE CVE-2016-5323 page", url: "https://www.suse.com/security/cve/CVE-2016-5323/", }, { category: "self", summary: "SUSE CVE CVE-2016-5652 page", url: "https://www.suse.com/security/cve/CVE-2016-5652/", }, { category: "self", summary: "SUSE CVE CVE-2016-5875 page", url: "https://www.suse.com/security/cve/CVE-2016-5875/", }, { category: "self", summary: "SUSE CVE CVE-2016-9273 page", url: "https://www.suse.com/security/cve/CVE-2016-9273/", }, { category: "self", summary: "SUSE CVE CVE-2016-9297 page", url: "https://www.suse.com/security/cve/CVE-2016-9297/", }, { category: "self", summary: "SUSE CVE CVE-2016-9448 page", url: "https://www.suse.com/security/cve/CVE-2016-9448/", }, { category: "self", summary: "SUSE CVE CVE-2016-9453 page", url: "https://www.suse.com/security/cve/CVE-2016-9453/", }, ], title: "libtiff-devel-32bit-4.0.7-1.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:10554-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libtiff-devel-4.0.7-1.1.aarch64", product: { name: "libtiff-devel-4.0.7-1.1.aarch64", product_id: "libtiff-devel-4.0.7-1.1.aarch64", }, }, { category: "product_version", name: "libtiff-devel-32bit-4.0.7-1.1.aarch64", product: { name: "libtiff-devel-32bit-4.0.7-1.1.aarch64", product_id: "libtiff-devel-32bit-4.0.7-1.1.aarch64", }, }, { category: "product_version", name: "libtiff5-4.0.7-1.1.aarch64", product: { name: "libtiff5-4.0.7-1.1.aarch64", product_id: "libtiff5-4.0.7-1.1.aarch64", }, }, { category: "product_version", name: "libtiff5-32bit-4.0.7-1.1.aarch64", product: { name: "libtiff5-32bit-4.0.7-1.1.aarch64", product_id: "libtiff5-32bit-4.0.7-1.1.aarch64", }, }, { category: "product_version", name: "tiff-4.0.7-1.1.aarch64", product: { name: "tiff-4.0.7-1.1.aarch64", product_id: "tiff-4.0.7-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "libtiff-devel-4.0.7-1.1.ppc64le", product: { name: "libtiff-devel-4.0.7-1.1.ppc64le", product_id: "libtiff-devel-4.0.7-1.1.ppc64le", }, }, { category: "product_version", name: "libtiff-devel-32bit-4.0.7-1.1.ppc64le", product: { name: "libtiff-devel-32bit-4.0.7-1.1.ppc64le", product_id: "libtiff-devel-32bit-4.0.7-1.1.ppc64le", }, }, { category: "product_version", name: "libtiff5-4.0.7-1.1.ppc64le", product: { name: "libtiff5-4.0.7-1.1.ppc64le", product_id: "libtiff5-4.0.7-1.1.ppc64le", }, }, { category: "product_version", name: "libtiff5-32bit-4.0.7-1.1.ppc64le", product: { name: "libtiff5-32bit-4.0.7-1.1.ppc64le", product_id: "libtiff5-32bit-4.0.7-1.1.ppc64le", }, }, { category: "product_version", name: "tiff-4.0.7-1.1.ppc64le", product: { name: "tiff-4.0.7-1.1.ppc64le", product_id: "tiff-4.0.7-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "libtiff-devel-4.0.7-1.1.s390x", product: { name: "libtiff-devel-4.0.7-1.1.s390x", product_id: "libtiff-devel-4.0.7-1.1.s390x", }, }, { category: "product_version", name: "libtiff-devel-32bit-4.0.7-1.1.s390x", product: { name: "libtiff-devel-32bit-4.0.7-1.1.s390x", product_id: "libtiff-devel-32bit-4.0.7-1.1.s390x", }, }, { category: "product_version", name: "libtiff5-4.0.7-1.1.s390x", product: { name: "libtiff5-4.0.7-1.1.s390x", product_id: "libtiff5-4.0.7-1.1.s390x", }, }, { category: "product_version", name: "libtiff5-32bit-4.0.7-1.1.s390x", product: { name: "libtiff5-32bit-4.0.7-1.1.s390x", product_id: "libtiff5-32bit-4.0.7-1.1.s390x", }, }, { category: "product_version", name: "tiff-4.0.7-1.1.s390x", product: { name: "tiff-4.0.7-1.1.s390x", product_id: "tiff-4.0.7-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "libtiff-devel-4.0.7-1.1.x86_64", product: { name: "libtiff-devel-4.0.7-1.1.x86_64", product_id: "libtiff-devel-4.0.7-1.1.x86_64", }, }, { category: "product_version", name: "libtiff-devel-32bit-4.0.7-1.1.x86_64", product: { name: "libtiff-devel-32bit-4.0.7-1.1.x86_64", product_id: "libtiff-devel-32bit-4.0.7-1.1.x86_64", }, }, { category: "product_version", name: "libtiff5-4.0.7-1.1.x86_64", product: { name: "libtiff5-4.0.7-1.1.x86_64", product_id: "libtiff5-4.0.7-1.1.x86_64", }, }, { category: "product_version", name: "libtiff5-32bit-4.0.7-1.1.x86_64", product: { name: "libtiff5-32bit-4.0.7-1.1.x86_64", product_id: "libtiff5-32bit-4.0.7-1.1.x86_64", }, }, { category: "product_version", name: "tiff-4.0.7-1.1.x86_64", product: { name: "tiff-4.0.7-1.1.x86_64", product_id: "tiff-4.0.7-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libtiff-devel-4.0.7-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", }, product_reference: "libtiff-devel-4.0.7-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-4.0.7-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", }, product_reference: "libtiff-devel-4.0.7-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-4.0.7-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", }, product_reference: "libtiff-devel-4.0.7-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-4.0.7-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", }, product_reference: "libtiff-devel-4.0.7-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-32bit-4.0.7-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", }, product_reference: "libtiff-devel-32bit-4.0.7-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-32bit-4.0.7-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", }, product_reference: "libtiff-devel-32bit-4.0.7-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-32bit-4.0.7-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", }, product_reference: "libtiff-devel-32bit-4.0.7-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-32bit-4.0.7-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", }, product_reference: "libtiff-devel-32bit-4.0.7-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.7-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", }, product_reference: "libtiff5-4.0.7-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.7-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", }, product_reference: "libtiff5-4.0.7-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.7-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", }, product_reference: "libtiff5-4.0.7-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.7-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", }, product_reference: "libtiff5-4.0.7-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff5-32bit-4.0.7-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", }, product_reference: "libtiff5-32bit-4.0.7-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff5-32bit-4.0.7-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", }, product_reference: "libtiff5-32bit-4.0.7-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff5-32bit-4.0.7-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", }, product_reference: "libtiff5-32bit-4.0.7-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff5-32bit-4.0.7-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", }, product_reference: "libtiff5-32bit-4.0.7-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tiff-4.0.7-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", }, product_reference: "tiff-4.0.7-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tiff-4.0.7-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", }, product_reference: "tiff-4.0.7-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tiff-4.0.7-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", }, product_reference: "tiff-4.0.7-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tiff-4.0.7-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", }, product_reference: "tiff-4.0.7-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2009-2285", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-2285", }, ], notes: [ { category: "general", text: "Buffer underflow in the LZWDecodeCompat function in libtiff 3.8.2 allows context-dependent attackers to cause a denial of service (crash) via a crafted TIFF image, a different vulnerability than CVE-2008-2327.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2009-2285", url: "https://www.suse.com/security/cve/CVE-2009-2285", }, { category: "external", summary: "SUSE Bug 518698 for CVE-2009-2285", url: "https://bugzilla.suse.com/518698", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2009-2285", }, { cve: "CVE-2009-2347", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-2347", }, ], notes: [ { category: "general", text: "Multiple integer overflows in inter-color spaces conversion tools in libtiff 3.8 through 3.8.2, 3.9, and 4.0 allow context-dependent attackers to execute arbitrary code via a TIFF image with large (1) width and (2) height values, which triggers a heap-based buffer overflow in the (a) cvt_whole_image function in tiff2rgba and (b) tiffcvt function in rgb2ycbcr.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2009-2347", url: "https://www.suse.com/security/cve/CVE-2009-2347", }, { category: "external", summary: "SUSE Bug 519796 for CVE-2009-2347", url: "https://bugzilla.suse.com/519796", }, { category: "external", summary: "SUSE Bug 616827 for CVE-2009-2347", url: "https://bugzilla.suse.com/616827", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2009-2347", }, { cve: "CVE-2010-2065", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2010-2065", }, ], notes: [ { category: "general", text: "Integer overflow in the TIFFroundup macro in LibTIFF before 3.9.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TIFF file that triggers a buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2010-2065", url: "https://www.suse.com/security/cve/CVE-2010-2065", }, { category: "external", summary: "SUSE Bug 612787 for CVE-2010-2065", url: "https://bugzilla.suse.com/612787", }, { category: "external", summary: "SUSE Bug 612879 for CVE-2010-2065", url: "https://bugzilla.suse.com/612879", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2010-2065", }, { cve: "CVE-2010-2067", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2010-2067", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the TIFFFetchSubjectDistance function in tif_dirread.c in LibTIFF before 3.9.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long EXIF SubjectDistance field in a TIFF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2010-2067", url: "https://www.suse.com/security/cve/CVE-2010-2067", }, { category: "external", summary: "SUSE Bug 612787 for CVE-2010-2067", url: "https://bugzilla.suse.com/612787", }, { category: "external", summary: "SUSE Bug 612879 for CVE-2010-2067", url: "https://bugzilla.suse.com/612879", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2010-2067", }, { cve: "CVE-2010-2233", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2010-2233", }, ], notes: [ { category: "general", text: "tif_getimage.c in LibTIFF 3.9.0 and 3.9.2 on 64-bit platforms, as used in ImageMagick, does not properly perform vertical flips, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TIFF image, related to \"downsampled OJPEG input.\"", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2010-2233", url: "https://www.suse.com/security/cve/CVE-2010-2233", }, { category: "external", summary: "SUSE Bug 612879 for CVE-2010-2233", url: "https://bugzilla.suse.com/612879", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2010-2233", }, { cve: "CVE-2010-4665", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2010-4665", }, ], notes: [ { category: "general", text: "Integer overflow in the ReadDirectory function in tiffdump.c in tiffdump in LibTIFF before 3.9.5 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF file containing a directory data structure with many directory entries.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2010-4665", url: "https://www.suse.com/security/cve/CVE-2010-4665", }, { category: "external", summary: "SUSE Bug 687442 for CVE-2010-4665", url: "https://bugzilla.suse.com/687442", }, { category: "external", summary: "SUSE Bug 854393 for CVE-2010-4665", url: "https://bugzilla.suse.com/854393", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2010-4665", }, { cve: "CVE-2011-0192", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-0192", }, ], notes: [ { category: "general", text: "Buffer overflow in Fax4Decode in LibTIFF 3.9.4 and possibly other versions, as used in ImageIO in Apple iTunes before 10.2 on Windows and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF Internet Fax image file that has been compressed using CCITT Group 4 encoding, related to the EXPAND2D macro in libtiff/tif_fax3.h. NOTE: some of these details are obtained from third party information.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-0192", url: "https://www.suse.com/security/cve/CVE-2011-0192", }, { category: "external", summary: "SUSE Bug 672510 for CVE-2011-0192", url: "https://bugzilla.suse.com/672510", }, { category: "external", summary: "SUSE Bug 682053 for CVE-2011-0192", url: "https://bugzilla.suse.com/682053", }, { category: "external", summary: "SUSE Bug 682871 for CVE-2011-0192", url: "https://bugzilla.suse.com/682871", }, { category: "external", summary: "SUSE Bug 854393 for CVE-2011-0192", url: "https://bugzilla.suse.com/854393", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2011-0192", }, { cve: "CVE-2011-1167", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-1167", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the thunder (aka ThunderScan) decoder in tif_thunder.c in LibTIFF 3.9.4 and earlier allows remote attackers to execute arbitrary code via crafted THUNDER_2BITDELTAS data in a .tiff file that has an unexpected BitsPerSample value.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-1167", url: "https://www.suse.com/security/cve/CVE-2011-1167", }, { category: "external", summary: "SUSE Bug 683337 for CVE-2011-1167", url: "https://bugzilla.suse.com/683337", }, { category: "external", summary: "SUSE Bug 854393 for CVE-2011-1167", url: "https://bugzilla.suse.com/854393", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2011-1167", }, { cve: "CVE-2012-1173", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-1173", }, ], notes: [ { category: "general", text: "Multiple integer overflows in tiff_getimage.c in LibTIFF 3.9.4 allow remote attackers to execute arbitrary code via a crafted tile size in a TIFF file, which is not properly handled by the (1) gtTileSeparate or (2) gtStripSeparate function, leading to a heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-1173", url: "https://www.suse.com/security/cve/CVE-2012-1173", }, { category: "external", summary: "SUSE Bug 753362 for CVE-2012-1173", url: "https://bugzilla.suse.com/753362", }, { category: "external", summary: "SUSE Bug 767852 for CVE-2012-1173", url: "https://bugzilla.suse.com/767852", }, { category: "external", summary: "SUSE Bug 854393 for CVE-2012-1173", url: "https://bugzilla.suse.com/854393", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2012-1173", }, { cve: "CVE-2012-2113", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-2113", }, ], notes: [ { category: "general", text: "Multiple integer overflows in tiff2pdf in libtiff before 4.0.2 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-2113", url: "https://www.suse.com/security/cve/CVE-2012-2113", }, { category: "external", summary: "SUSE Bug 767852 for CVE-2012-2113", url: "https://bugzilla.suse.com/767852", }, { category: "external", summary: "SUSE Bug 854393 for CVE-2012-2113", url: "https://bugzilla.suse.com/854393", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2012-2113", }, { cve: "CVE-2012-3401", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-3401", }, ], notes: [ { category: "general", text: "The t2p_read_tiff_init function in tiff2pdf (tools/tiff2pdf.c) in LibTIFF 4.0.2 and earlier does not properly initialize the T2P context struct pointer in certain error conditions, which allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image that triggers a heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-3401", url: "https://www.suse.com/security/cve/CVE-2012-3401", }, { category: "external", summary: "SUSE Bug 770816 for CVE-2012-3401", url: "https://bugzilla.suse.com/770816", }, { category: "external", summary: "SUSE Bug 854393 for CVE-2012-3401", url: "https://bugzilla.suse.com/854393", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2012-3401", }, { cve: "CVE-2012-4564", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-4564", }, ], notes: [ { category: "general", text: "ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-4564", url: "https://www.suse.com/security/cve/CVE-2012-4564", }, { category: "external", summary: "SUSE Bug 781995 for CVE-2012-4564", url: "https://bugzilla.suse.com/781995", }, { category: "external", summary: "SUSE Bug 787892 for CVE-2012-4564", url: "https://bugzilla.suse.com/787892", }, { category: "external", summary: "SUSE Bug 791607 for CVE-2012-4564", url: "https://bugzilla.suse.com/791607", }, { category: "external", summary: "SUSE Bug 854393 for CVE-2012-4564", url: "https://bugzilla.suse.com/854393", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2012-4564", }, { cve: "CVE-2013-1960", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2013-1960", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the t2p_process_jpeg_strip function in tiff2pdf in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2013-1960", url: "https://www.suse.com/security/cve/CVE-2013-1960", }, { category: "external", summary: "SUSE Bug 817573 for CVE-2013-1960", url: "https://bugzilla.suse.com/817573", }, { category: "external", summary: "SUSE Bug 854393 for CVE-2013-1960", url: "https://bugzilla.suse.com/854393", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2013-1960", }, { cve: "CVE-2013-1961", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2013-1961", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the t2p_write_pdf_page function in tiff2pdf in libtiff before 4.0.3 allows remote attackers to cause a denial of service (application crash) via a crafted image length and resolution in a TIFF image file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2013-1961", url: "https://www.suse.com/security/cve/CVE-2013-1961", }, { category: "external", summary: "SUSE Bug 817573 for CVE-2013-1961", url: "https://bugzilla.suse.com/817573", }, { category: "external", summary: "SUSE Bug 818117 for CVE-2013-1961", url: "https://bugzilla.suse.com/818117", }, { category: "external", summary: "SUSE Bug 854393 for CVE-2013-1961", url: "https://bugzilla.suse.com/854393", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2013-1961", }, { cve: "CVE-2013-4231", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2013-4231", }, ], notes: [ { category: "general", text: "Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2013-4231", url: "https://www.suse.com/security/cve/CVE-2013-4231", }, { category: "external", summary: "SUSE Bug 834477 for CVE-2013-4231", url: "https://bugzilla.suse.com/834477", }, { category: "external", summary: "SUSE Bug 854393 for CVE-2013-4231", url: "https://bugzilla.suse.com/854393", }, { category: "external", summary: "SUSE Bug 969783 for CVE-2013-4231", url: "https://bugzilla.suse.com/969783", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2013-4231", }, { cve: "CVE-2013-4232", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2013-4232", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in the t2p_readwrite_pdf_image function in tools/tiff2pdf.c in libtiff 4.0.3 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted TIFF image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2013-4232", url: "https://www.suse.com/security/cve/CVE-2013-4232", }, { category: "external", summary: "SUSE Bug 834477 for CVE-2013-4232", url: "https://bugzilla.suse.com/834477", }, { category: "external", summary: "SUSE Bug 854393 for CVE-2013-4232", url: "https://bugzilla.suse.com/854393", }, { category: "external", summary: "SUSE Bug 969783 for CVE-2013-4232", url: "https://bugzilla.suse.com/969783", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2013-4232", }, { cve: "CVE-2013-4243", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2013-4243", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the readgifimage function in the gif2tiff tool in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted height and width values in a GIF image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2013-4243", url: "https://www.suse.com/security/cve/CVE-2013-4243", }, { category: "external", summary: "SUSE Bug 834779 for CVE-2013-4243", url: "https://bugzilla.suse.com/834779", }, { category: "external", summary: "SUSE Bug 854393 for CVE-2013-4243", url: "https://bugzilla.suse.com/854393", }, { category: "external", summary: "SUSE Bug 969783 for CVE-2013-4243", url: "https://bugzilla.suse.com/969783", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2013-4243", }, { cve: "CVE-2013-4244", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2013-4244", }, ], notes: [ { category: "general", text: "The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2013-4244", url: "https://www.suse.com/security/cve/CVE-2013-4244", }, { category: "external", summary: "SUSE Bug 834788 for CVE-2013-4244", url: "https://bugzilla.suse.com/834788", }, { category: "external", summary: "SUSE Bug 854393 for CVE-2013-4244", url: "https://bugzilla.suse.com/854393", }, { category: "external", summary: "SUSE Bug 969783 for CVE-2013-4244", url: "https://bugzilla.suse.com/969783", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2013-4244", }, { cve: "CVE-2014-8127", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-8127", }, ], notes: [ { category: "general", text: "LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted TIFF image to the (1) checkInkNamesString function in tif_dir.c in the thumbnail tool, (2) compresscontig function in tiff2bw.c in the tiff2bw tool, (3) putcontig8bitCIELab function in tif_getimage.c in the tiff2rgba tool, LZWPreDecode function in tif_lzw.c in the (4) tiff2ps or (5) tiffdither tool, (6) NeXTDecode function in tif_next.c in the tiffmedian tool, or (7) TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-8127", url: "https://www.suse.com/security/cve/CVE-2014-8127", }, { category: "external", summary: "SUSE Bug 1206220 for CVE-2014-8127", url: "https://bugzilla.suse.com/1206220", }, { category: "external", summary: "SUSE Bug 914890 for CVE-2014-8127", url: "https://bugzilla.suse.com/914890", }, { category: "external", summary: "SUSE Bug 916925 for CVE-2014-8127", url: "https://bugzilla.suse.com/916925", }, { category: "external", summary: "SUSE Bug 942690 for CVE-2014-8127", url: "https://bugzilla.suse.com/942690", }, { category: "external", summary: "SUSE Bug 969783 for CVE-2014-8127", url: "https://bugzilla.suse.com/969783", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2014-8127", }, { cve: "CVE-2014-8128", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-8128", }, ], notes: [ { category: "general", text: "LibTIFF prior to 4.0.4, as used in Apple iOS before 8.4 and OS X before 10.10.4 and other products, allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted TIFF image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-8128", url: "https://www.suse.com/security/cve/CVE-2014-8128", }, { category: "external", summary: "SUSE Bug 1007276 for CVE-2014-8128", url: "https://bugzilla.suse.com/1007276", }, { category: "external", summary: "SUSE Bug 1017690 for CVE-2014-8128", url: "https://bugzilla.suse.com/1017690", }, { category: "external", summary: "SUSE Bug 1040322 for CVE-2014-8128", url: "https://bugzilla.suse.com/1040322", }, { category: "external", summary: "SUSE Bug 1206220 for CVE-2014-8128", url: "https://bugzilla.suse.com/1206220", }, { category: "external", summary: "SUSE Bug 914890 for CVE-2014-8128", url: "https://bugzilla.suse.com/914890", }, { category: "external", summary: "SUSE Bug 916925 for CVE-2014-8128", url: "https://bugzilla.suse.com/916925", }, { category: "external", summary: "SUSE Bug 942690 for CVE-2014-8128", url: "https://bugzilla.suse.com/942690", }, { category: "external", summary: "SUSE Bug 960341 for CVE-2014-8128", url: "https://bugzilla.suse.com/960341", }, { category: "external", summary: "SUSE Bug 969783 for CVE-2014-8128", url: "https://bugzilla.suse.com/969783", }, { category: "external", summary: "SUSE Bug 974621 for CVE-2014-8128", url: "https://bugzilla.suse.com/974621", }, { category: "external", summary: "SUSE Bug 983436 for CVE-2014-8128", url: "https://bugzilla.suse.com/983436", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2014-8128", }, { cve: "CVE-2014-8129", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-8129", }, ], notes: [ { category: "general", text: "LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by failure of tif_next.c to verify that the BitsPerSample value is 2, and the t2p_sample_lab_signed_to_unsigned function in tiff2pdf.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-8129", url: "https://www.suse.com/security/cve/CVE-2014-8129", }, { category: "external", summary: "SUSE Bug 1206220 for CVE-2014-8129", url: "https://bugzilla.suse.com/1206220", }, { category: "external", summary: "SUSE Bug 914890 for CVE-2014-8129", url: "https://bugzilla.suse.com/914890", }, { category: "external", summary: "SUSE Bug 916925 for CVE-2014-8129", url: "https://bugzilla.suse.com/916925", }, { category: "external", summary: "SUSE Bug 942690 for CVE-2014-8129", url: "https://bugzilla.suse.com/942690", }, { category: "external", summary: "SUSE Bug 969783 for CVE-2014-8129", url: "https://bugzilla.suse.com/969783", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2014-8129", }, { cve: "CVE-2014-8130", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-8130", }, ], notes: [ { category: "general", text: "The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image that is mishandled by the TIFFWriteScanline function in tif_write.c, as demonstrated by tiffdither.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-8130", url: "https://www.suse.com/security/cve/CVE-2014-8130", }, { category: "external", summary: "SUSE Bug 1206220 for CVE-2014-8130", url: "https://bugzilla.suse.com/1206220", }, { category: "external", summary: "SUSE Bug 914890 for CVE-2014-8130", url: "https://bugzilla.suse.com/914890", }, { category: "external", summary: "SUSE Bug 916925 for CVE-2014-8130", url: "https://bugzilla.suse.com/916925", }, { category: "external", summary: "SUSE Bug 942690 for CVE-2014-8130", url: "https://bugzilla.suse.com/942690", }, { category: "external", summary: "SUSE Bug 969783 for CVE-2014-8130", url: "https://bugzilla.suse.com/969783", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2014-8130", }, { cve: "CVE-2014-9655", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-9655", }, ], notes: [ { category: "general", text: "The (1) putcontig8bitYCbCr21tile function in tif_getimage.c or (2) NeXTDecode function in tif_next.c in LibTIFF allows remote attackers to cause a denial of service (uninitialized memory access) via a crafted TIFF image, as demonstrated by libtiff-cvs-1.tif and libtiff-cvs-2.tif.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-9655", url: "https://www.suse.com/security/cve/CVE-2014-9655", }, { category: "external", summary: "SUSE Bug 1206220 for CVE-2014-9655", url: "https://bugzilla.suse.com/1206220", }, { category: "external", summary: "SUSE Bug 914890 for CVE-2014-9655", url: "https://bugzilla.suse.com/914890", }, { category: "external", summary: "SUSE Bug 916925 for CVE-2014-9655", url: "https://bugzilla.suse.com/916925", }, { category: "external", summary: "SUSE Bug 916927 for CVE-2014-9655", url: "https://bugzilla.suse.com/916927", }, { category: "external", summary: "SUSE Bug 969783 for CVE-2014-9655", url: "https://bugzilla.suse.com/969783", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2014-9655", }, { cve: "CVE-2015-1547", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-1547", }, ], notes: [ { category: "general", text: "The NeXTDecode function in tif_next.c in LibTIFF allows remote attackers to cause a denial of service (uninitialized memory access) via a crafted TIFF image, as demonstrated by libtiff5.tif.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-1547", url: "https://www.suse.com/security/cve/CVE-2015-1547", }, { category: "external", summary: "SUSE Bug 1206220 for CVE-2015-1547", url: "https://bugzilla.suse.com/1206220", }, { category: "external", summary: "SUSE Bug 914890 for CVE-2015-1547", url: "https://bugzilla.suse.com/914890", }, { category: "external", summary: "SUSE Bug 916925 for CVE-2015-1547", url: "https://bugzilla.suse.com/916925", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2015-1547", }, { cve: "CVE-2015-7554", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-7554", }, ], notes: [ { category: "general", text: "The _TIFFVGetField function in tif_dir.c in libtiff 4.0.6 allows attackers to cause a denial of service (invalid memory write and crash) or possibly have unspecified other impact via crafted field data in an extension tag in a TIFF image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-7554", url: "https://www.suse.com/security/cve/CVE-2015-7554", }, { category: "external", summary: "SUSE Bug 1007276 for CVE-2015-7554", url: "https://bugzilla.suse.com/1007276", }, { category: "external", summary: "SUSE Bug 1017690 for CVE-2015-7554", url: "https://bugzilla.suse.com/1017690", }, { category: "external", summary: "SUSE Bug 1040322 for CVE-2015-7554", url: "https://bugzilla.suse.com/1040322", }, { category: "external", summary: "SUSE Bug 960341 for CVE-2015-7554", url: "https://bugzilla.suse.com/960341", }, { category: "external", summary: "SUSE Bug 974621 for CVE-2015-7554", url: "https://bugzilla.suse.com/974621", }, { category: "external", summary: "SUSE Bug 983436 for CVE-2015-7554", url: "https://bugzilla.suse.com/983436", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2015-7554", }, { cve: "CVE-2015-8665", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8665", }, ], notes: [ { category: "general", text: "tif_getimage.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via the SamplesPerPixel tag in a TIFF image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8665", url: "https://www.suse.com/security/cve/CVE-2015-8665", }, { category: "external", summary: "SUSE Bug 1156749 for CVE-2015-8665", url: "https://bugzilla.suse.com/1156749", }, { category: "external", summary: "SUSE Bug 1156754 for CVE-2015-8665", url: "https://bugzilla.suse.com/1156754", }, { category: "external", summary: "SUSE Bug 1200195 for CVE-2015-8665", url: "https://bugzilla.suse.com/1200195", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2015-8665", }, { cve: "CVE-2015-8683", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8683", }, ], notes: [ { category: "general", text: "The putcontig8bitCIELab function in tif_getimage.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via a packed TIFF image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8683", url: "https://www.suse.com/security/cve/CVE-2015-8683", }, { category: "external", summary: "SUSE Bug 1156749 for CVE-2015-8683", url: "https://bugzilla.suse.com/1156749", }, { category: "external", summary: "SUSE Bug 1156754 for CVE-2015-8683", url: "https://bugzilla.suse.com/1156754", }, { category: "external", summary: "SUSE Bug 1200195 for CVE-2015-8683", url: "https://bugzilla.suse.com/1200195", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2015-8683", }, { cve: "CVE-2015-8781", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8781", }, ], notes: [ { category: "general", text: "tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds write) via an invalid number of samples per pixel in a LogL compressed TIFF image, a different vulnerability than CVE-2015-8782.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8781", url: "https://www.suse.com/security/cve/CVE-2015-8781", }, { category: "external", summary: "SUSE Bug 964213 for CVE-2015-8781", url: "https://bugzilla.suse.com/964213", }, { category: "external", summary: "SUSE Bug 964225 for CVE-2015-8781", url: "https://bugzilla.suse.com/964225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2015-8781", }, { cve: "CVE-2015-8782", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8782", }, ], notes: [ { category: "general", text: "tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds writes) via a crafted TIFF image, a different vulnerability than CVE-2015-8781.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8782", url: "https://www.suse.com/security/cve/CVE-2015-8782", }, { category: "external", summary: "SUSE Bug 964213 for CVE-2015-8782", url: "https://bugzilla.suse.com/964213", }, { category: "external", summary: "SUSE Bug 964225 for CVE-2015-8782", url: "https://bugzilla.suse.com/964225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2015-8782", }, { cve: "CVE-2015-8783", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8783", }, ], notes: [ { category: "general", text: "tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds reads) via a crafted TIFF image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8783", url: "https://www.suse.com/security/cve/CVE-2015-8783", }, { category: "external", summary: "SUSE Bug 964213 for CVE-2015-8783", url: "https://bugzilla.suse.com/964213", }, { category: "external", summary: "SUSE Bug 964225 for CVE-2015-8783", url: "https://bugzilla.suse.com/964225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2015-8783", }, { cve: "CVE-2016-3186", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3186", }, ], notes: [ { category: "general", text: "Buffer overflow in the readextension function in gif2tiff.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (application crash) via a crafted GIF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3186", url: "https://www.suse.com/security/cve/CVE-2016-3186", }, { category: "external", summary: "SUSE Bug 973340 for CVE-2016-3186", url: "https://bugzilla.suse.com/973340", }, { category: "external", summary: "SUSE Bug 983268 for CVE-2016-3186", url: "https://bugzilla.suse.com/983268", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-3186", }, { cve: "CVE-2016-3622", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3622", }, ], notes: [ { category: "general", text: "The fpAcc function in tif_predict.c in the tiff2rgba tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted TIFF image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3622", url: "https://www.suse.com/security/cve/CVE-2016-3622", }, { category: "external", summary: "SUSE Bug 974449 for CVE-2016-3622", url: "https://bugzilla.suse.com/974449", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2016-3622", }, { cve: "CVE-2016-3623", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3623", }, ], notes: [ { category: "general", text: "The rgb2ycbcr tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero) by setting the (1) v or (2) h parameter to 0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3623", url: "https://www.suse.com/security/cve/CVE-2016-3623", }, { category: "external", summary: "SUSE Bug 974617 for CVE-2016-3623", url: "https://bugzilla.suse.com/974617", }, { category: "external", summary: "SUSE Bug 974618 for CVE-2016-3623", url: "https://bugzilla.suse.com/974618", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2016-3623", }, { cve: "CVE-2016-3658", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3658", }, ], notes: [ { category: "general", text: "The TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via vectors involving the ma variable.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3658", url: "https://www.suse.com/security/cve/CVE-2016-3658", }, { category: "external", summary: "SUSE Bug 974840 for CVE-2016-3658", url: "https://bugzilla.suse.com/974840", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2016-3658", }, { cve: "CVE-2016-3945", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3945", }, ], notes: [ { category: "general", text: "Multiple integer overflows in the (1) cvt_by_strip and (2) cvt_by_tile functions in the tiff2rgba tool in LibTIFF 4.0.6 and earlier, when -b mode is enabled, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image, which triggers an out-of-bounds write.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3945", url: "https://www.suse.com/security/cve/CVE-2016-3945", }, { category: "external", summary: "SUSE Bug 974614 for CVE-2016-3945", url: "https://bugzilla.suse.com/974614", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2016-3945", }, { cve: "CVE-2016-3990", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3990", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the horizontalDifference8 function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image to tiffcp.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3990", url: "https://www.suse.com/security/cve/CVE-2016-3990", }, { category: "external", summary: "SUSE Bug 975069 for CVE-2016-3990", url: "https://bugzilla.suse.com/975069", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2016-3990", }, { cve: "CVE-2016-3991", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3991", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the loadImage function in the tiffcrop tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted TIFF image with zero tiles.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3991", url: "https://www.suse.com/security/cve/CVE-2016-3991", }, { category: "external", summary: "SUSE Bug 975070 for CVE-2016-3991", url: "https://bugzilla.suse.com/975070", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2016-3991", }, { cve: "CVE-2016-5314", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5314", }, ], notes: [ { category: "general", text: "Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5314", url: "https://www.suse.com/security/cve/CVE-2016-5314", }, { category: "external", summary: "SUSE Bug 984831 for CVE-2016-5314", url: "https://bugzilla.suse.com/984831", }, { category: "external", summary: "SUSE Bug 987351 for CVE-2016-5314", url: "https://bugzilla.suse.com/987351", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-5314", }, { cve: "CVE-2016-5316", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5316", }, ], notes: [ { category: "general", text: "Out-of-bounds read in the PixarLogCleanup function in tif_pixarlog.c in libtiff 4.0.6 and earlier allows remote attackers to crash the application by sending a crafted TIFF image to the rgb2ycbcr tool.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5316", url: "https://www.suse.com/security/cve/CVE-2016-5316", }, { category: "external", summary: "SUSE Bug 984837 for CVE-2016-5316", url: "https://bugzilla.suse.com/984837", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-5316", }, { cve: "CVE-2016-5317", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5317", }, ], notes: [ { category: "general", text: "Buffer overflow in the PixarLogDecode function in libtiff.so in the PixarLogDecode function in libtiff 4.0.6 and earlier, as used in GNOME nautilus, allows attackers to cause a denial of service attack (crash) via a crafted TIFF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5317", url: "https://www.suse.com/security/cve/CVE-2016-5317", }, { category: "external", summary: "SUSE Bug 984842 for CVE-2016-5317", url: "https://bugzilla.suse.com/984842", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-5317", }, { cve: "CVE-2016-5320", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5320", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-5314. Reason: This candidate is a reservation duplicate of CVE-2016-5314. Notes: All CVE users should reference CVE-2016-5314 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5320", url: "https://www.suse.com/security/cve/CVE-2016-5320", }, { category: "external", summary: "SUSE Bug 1007284 for CVE-2016-5320", url: "https://bugzilla.suse.com/1007284", }, { category: "external", summary: "SUSE Bug 984808 for CVE-2016-5320", url: "https://bugzilla.suse.com/984808", }, { category: "external", summary: "SUSE Bug 987351 for CVE-2016-5320", url: "https://bugzilla.suse.com/987351", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-5320", }, { cve: "CVE-2016-5321", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5321", }, ], notes: [ { category: "general", text: "The DumpModeDecode function in libtiff 4.0.6 and earlier allows attackers to cause a denial of service (invalid read and crash) via a crafted tiff image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5321", url: "https://www.suse.com/security/cve/CVE-2016-5321", }, { category: "external", summary: "SUSE Bug 984813 for CVE-2016-5321", url: "https://bugzilla.suse.com/984813", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-5321", }, { cve: "CVE-2016-5323", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5323", }, ], notes: [ { category: "general", text: "The _TIFFFax3fillruns function in libtiff before 4.0.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted Tiff image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5323", url: "https://www.suse.com/security/cve/CVE-2016-5323", }, { category: "external", summary: "SUSE Bug 984815 for CVE-2016-5323", url: "https://bugzilla.suse.com/984815", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-5323", }, { cve: "CVE-2016-5652", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5652", }, ], notes: [ { category: "general", text: "An exploitable heap-based buffer overflow exists in the handling of TIFF images in LibTIFF's TIFF2PDF tool. A crafted TIFF document can lead to a heap-based buffer overflow resulting in remote code execution. Vulnerability can be triggered via a saved TIFF file delivered by other means.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5652", url: "https://www.suse.com/security/cve/CVE-2016-5652", }, { category: "external", summary: "SUSE Bug 1007280 for CVE-2016-5652", url: "https://bugzilla.suse.com/1007280", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-5652", }, { cve: "CVE-2016-5875", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5875", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-5314. Reason: This candidate is a reservation duplicate of CVE-2016-5314. Notes: All CVE users should reference CVE-2016-5314 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5875", url: "https://www.suse.com/security/cve/CVE-2016-5875", }, { category: "external", summary: "SUSE Bug 1007284 for CVE-2016-5875", url: "https://bugzilla.suse.com/1007284", }, { category: "external", summary: "SUSE Bug 984809 for CVE-2016-5875", url: "https://bugzilla.suse.com/984809", }, { category: "external", summary: "SUSE Bug 984831 for CVE-2016-5875", url: "https://bugzilla.suse.com/984831", }, { category: "external", summary: "SUSE Bug 987351 for CVE-2016-5875", url: "https://bugzilla.suse.com/987351", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-5875", }, { cve: "CVE-2016-9273", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9273", }, ], notes: [ { category: "general", text: "tiffsplit in libtiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file, related to changing td_nstrips in TIFF_STRIPCHOP mode.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9273", url: "https://www.suse.com/security/cve/CVE-2016-9273", }, { category: "external", summary: "SUSE Bug 1010163 for CVE-2016-9273", url: "https://bugzilla.suse.com/1010163", }, { category: "external", summary: "SUSE Bug 1017693 for CVE-2016-9273", url: "https://bugzilla.suse.com/1017693", }, { category: "external", summary: "SUSE Bug 1150480 for CVE-2016-9273", url: "https://bugzilla.suse.com/1150480", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-9273", }, { cve: "CVE-2016-9297", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9297", }, ], notes: [ { category: "general", text: "The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via crafted TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII tag values.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9297", url: "https://www.suse.com/security/cve/CVE-2016-9297", }, { category: "external", summary: "SUSE Bug 1010161 for CVE-2016-9297", url: "https://bugzilla.suse.com/1010161", }, { category: "external", summary: "SUSE Bug 1011103 for CVE-2016-9297", url: "https://bugzilla.suse.com/1011103", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-9297", }, { cve: "CVE-2016-9448", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9448", }, ], notes: [ { category: "general", text: "The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by setting the tags TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII to values that access 0-byte arrays. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9297.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9448", url: "https://www.suse.com/security/cve/CVE-2016-9448", }, { category: "external", summary: "SUSE Bug 1010161 for CVE-2016-9448", url: "https://bugzilla.suse.com/1010161", }, { category: "external", summary: "SUSE Bug 1011103 for CVE-2016-9448", url: "https://bugzilla.suse.com/1011103", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-9448", }, { cve: "CVE-2016-9453", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9453", }, ], notes: [ { category: "general", text: "The t2p_readwrite_pdf_image_tile function in LibTIFF allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a JPEG file with a TIFFTAG_JPEGTABLES of length one.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9453", url: "https://www.suse.com/security/cve/CVE-2016-9453", }, { category: "external", summary: "SUSE Bug 1007280 for CVE-2016-9453", url: "https://bugzilla.suse.com/1007280", }, { category: "external", summary: "SUSE Bug 1011107 for CVE-2016-9453", url: "https://bugzilla.suse.com/1011107", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2016-9453", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.