Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-5323
Vulnerability from cvelistv5
Published
2017-01-20 15:00
Modified
2024-08-06 01:00
Severity ?
EPSS score ?
Summary
The _TIFFFax3fillruns function in libtiff before 4.0.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted Tiff image.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html | Third Party Advisory | |
cve@mitre.org | http://www.debian.org/security/2017/dsa-3762 | ||
cve@mitre.org | http://www.openwall.com/lists/oss-security/2016/06/15/6 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/91196 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://security.gentoo.org/glsa/201701-16 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2017/dsa-3762 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/06/15/6 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/91196 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201701-16 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T01:00:58.584Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "91196", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/91196", }, { name: "[oss-security] 20160615 CVE-2016-5323: libtiff 4.0.6 tiffcrop _TIFFFax3fillruns(): divide by zero", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2016/06/15/6", }, { name: "openSUSE-SU-2016:3035", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html", }, { name: "GLSA-201701-16", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201701-16", }, { name: "DSA-3762", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2017/dsa-3762", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-06-15T00:00:00", descriptions: [ { lang: "en", value: "The _TIFFFax3fillruns function in libtiff before 4.0.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted Tiff image.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-11-03T18:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "91196", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/91196", }, { name: "[oss-security] 20160615 CVE-2016-5323: libtiff 4.0.6 tiffcrop _TIFFFax3fillruns(): divide by zero", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2016/06/15/6", }, { name: "openSUSE-SU-2016:3035", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html", }, { name: "GLSA-201701-16", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201701-16", }, { name: "DSA-3762", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2017/dsa-3762", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-5323", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The _TIFFFax3fillruns function in libtiff before 4.0.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted Tiff image.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "91196", refsource: "BID", url: "http://www.securityfocus.com/bid/91196", }, { name: "[oss-security] 20160615 CVE-2016-5323: libtiff 4.0.6 tiffcrop _TIFFFax3fillruns(): divide by zero", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/06/15/6", }, { name: "openSUSE-SU-2016:3035", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html", }, { name: "GLSA-201701-16", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-16", }, { name: "DSA-3762", refsource: "DEBIAN", url: "http://www.debian.org/security/2017/dsa-3762", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2016-5323", datePublished: "2017-01-20T15:00:00", dateReserved: "2016-06-06T00:00:00", dateUpdated: "2024-08-06T01:00:58.584Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2016-5323\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-01-20T15:59:00.520\",\"lastModified\":\"2024-11-21T02:54:06.230\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The _TIFFFax3fillruns function in libtiff before 4.0.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted Tiff image.\"},{\"lang\":\"es\",\"value\":\"La función _TIFFFax3fillruns en libtiff en versiones anteriores a 4.0.6 permite a atacantes remotos provocar una denegación de servicio (error de división por cero y caída de aplicación) a través de una imagen Tiff manipulada.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-369\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0.6\",\"matchCriteriaId\":\"7DBB051D-E94D-4553-88A6-750BE80B7617\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03117DF1-3BEC-4B8D-AD63-DBBDB2126081\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2017/dsa-3762\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/06/15/6\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/91196\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://security.gentoo.org/glsa/201701-16\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2017/dsa-3762\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/06/15/6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/91196\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://security.gentoo.org/glsa/201701-16\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", }, }
ghsa-qxv7-458j-gmmx
Vulnerability from github
Published
2022-05-14 02:05
Modified
2022-05-14 02:05
Severity ?
Details
The _TIFFFax3fillruns function in libtiff before 4.0.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted Tiff image.
{ affected: [], aliases: [ "CVE-2016-5323", ], database_specific: { cwe_ids: [ "CWE-369", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2017-01-20T15:59:00Z", severity: "HIGH", }, details: "The _TIFFFax3fillruns function in libtiff before 4.0.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted Tiff image.", id: "GHSA-qxv7-458j-gmmx", modified: "2022-05-14T02:05:04Z", published: "2022-05-14T02:05:04Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2016-5323", }, { type: "WEB", url: "https://security.gentoo.org/glsa/201701-16", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html", }, { type: "WEB", url: "http://www.debian.org/security/2017/dsa-3762", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2016/06/15/6", }, { type: "WEB", url: "http://www.securityfocus.com/bid/91196", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", type: "CVSS_V3", }, ], }
WID-SEC-W-2023-2409
Vulnerability from csaf_certbund
Published
2016-06-14 22:00
Modified
2023-10-08 22:00
Summary
libTIFF: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
libTIFF ist ein Softwarepaket für die Verarbeitung von Bilddateien in Tag Image File Format (TIFF).
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in libTIFF ausnutzen, um beliebigen Programmcode mit den Rechten des Dienstes auszuführen oder um einen Denial of Service Zustand hervorzurufen.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "libTIFF ist ein Softwarepaket für die Verarbeitung von Bilddateien in Tag Image File Format (TIFF).", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in libTIFF ausnutzen, um beliebigen Programmcode mit den Rechten des Dienstes auszuführen oder um einen Denial of Service Zustand hervorzurufen.", title: "Angriff", }, { category: "general", text: "- UNIX\n- Linux\n- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-2409 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2016/wid-sec-w-2023-2409.json", }, { category: "self", summary: "WID-SEC-2023-2409 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2409", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2023-1855 vom 2023-10-06", url: "https://alas.aws.amazon.com/ALAS-2023-1855.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS2-2023-2263 vom 2023-09-21", url: "https://alas.aws.amazon.com/AL2/ALAS-2023-2263.html", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/1", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/2", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/3", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/5", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/6", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/7", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/8", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/9", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2016:1546 vom 2016-08-03", url: "https://rhn.redhat.com/errata/RHSA-2016-1546.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2016:1547 vom 2016-08-03", url: "https://rhn.redhat.com/errata/RHSA-2016-1547.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2016:2271-1 vom 2016-09-10", url: "https://www.suse.com/support/update/announcement/2016/suse-su-20162271-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2016:2527-1 vom 2016-10-13", url: "https://www.suse.com/support/update/announcement/2016/suse-su-20162527-1.html", }, { category: "external", summary: "F5 Security Advisory SOL89096577 vom 2016-11-08", url: "https://support.f5.com/kb/en-us/solutions/public/k/89/sol89096577.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2016:3301-1 vom 2016-12-30", url: "https://www.suse.com/support/update/announcement/2016/suse-su-20163301-1.html", }, { category: "external", summary: "Debian Security Advisory DSA-3762 vom 2017-01-14", url: "https://www.debian.org/security/2017/dsa-3762", }, { category: "external", summary: "Ubuntu Security Notice USN-3212-1 vom 2017-02-27", url: "http://www.ubuntu.com/usn/usn-3212-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-3212-2 vom 2017-05-30", url: "http://www.ubuntu.com/usn/usn-3212-2/", }, { category: "external", summary: "Ubuntu Security Notice USN-3212-3 vom 2017-07-19", url: "http://www.ubuntu.com/usn/usn-3212-3/", }, { category: "external", summary: "Ubuntu Security Notice USN-3212-4 vom 2017-08-07", url: "http://www.ubuntu.com/usn/usn-3212-4/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2018:1472-1 vom 2018-05-31", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20181472-1.html", }, { category: "external", summary: "Juniper Security Advisory JSA11023 vom 2020-07-08", url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA11023", }, ], source_lang: "en-US", title: "libTIFF: Mehrere Schwachstellen", tracking: { current_release_date: "2023-10-08T22:00:00.000+00:00", generator: { date: "2024-08-15T17:58:41.982+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-2409", initial_release_date: "2016-06-14T22:00:00.000+00:00", revision_history: [ { date: "2016-06-14T22:00:00.000+00:00", number: "1", summary: "Initial Release", }, { date: "2016-06-14T22:00:00.000+00:00", number: "2", summary: "Version nicht vorhanden", }, { date: "2016-06-14T22:00:00.000+00:00", number: "3", summary: "Version nicht vorhanden", }, { date: "2016-08-02T22:00:00.000+00:00", number: "4", summary: "New remediations available", }, { date: "2016-08-02T22:00:00.000+00:00", number: "5", summary: "Version nicht vorhanden", }, { date: "2016-08-02T22:00:00.000+00:00", number: "6", summary: "Version nicht vorhanden", }, { date: "2016-08-02T22:00:00.000+00:00", number: "7", summary: "Version nicht vorhanden", }, { date: "2016-09-11T22:00:00.000+00:00", number: "8", summary: "New remediations available", }, { date: "2016-10-13T22:00:00.000+00:00", number: "9", summary: "New remediations available", }, { date: "2016-11-08T23:00:00.000+00:00", number: "10", summary: "New remediations available", }, { date: "2016-11-08T23:00:00.000+00:00", number: "11", summary: "Version nicht vorhanden", }, { date: "2016-12-29T23:00:00.000+00:00", number: "12", summary: "New remediations available", }, { date: "2017-01-15T23:00:00.000+00:00", number: "13", summary: "New remediations available", }, { date: "2017-02-27T23:00:00.000+00:00", number: "14", summary: "New remediations available", }, { date: "2017-05-30T22:00:00.000+00:00", number: "15", summary: "New remediations available", }, { date: "2017-07-19T22:00:00.000+00:00", number: "16", summary: "New remediations available", }, { date: "2017-08-07T22:00:00.000+00:00", number: "17", summary: "New remediations available", }, { date: "2018-05-31T22:00:00.000+00:00", number: "18", summary: "New remediations available", }, { date: "2020-07-08T22:00:00.000+00:00", number: "19", summary: "Neue Updates von Juniper aufgenommen", }, { date: "2023-09-20T22:00:00.000+00:00", number: "20", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2023-10-08T22:00:00.000+00:00", number: "21", summary: "Neue Updates von Amazon aufgenommen", }, ], status: "final", version: "21", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "F5 WebAccelerator", product: { name: "F5 WebAccelerator", product_id: "T001723", product_identification_helper: { cpe: "cpe:/h:f5:big-ip_webaccelerator:-", }, }, }, ], category: "vendor", name: "F5", }, { branches: [ { category: "product_name", name: "Juniper Junos Space < 20.1R1", product: { name: "Juniper Junos Space < 20.1R1", product_id: "T016874", product_identification_helper: { cpe: "cpe:/a:juniper:junos_space:20.1r1", }, }, }, ], category: "vendor", name: "Juniper", }, { branches: [ { category: "product_name", name: "Open Source CentOS", product: { name: "Open Source CentOS", product_id: "1727", product_identification_helper: { cpe: "cpe:/o:centos:centos:-", }, }, }, { category: "product_name", name: "Open Source libTIFF <= 4.0.6", product: { name: "Open Source libTIFF <= 4.0.6", product_id: "T006693", product_identification_helper: { cpe: "cpe:/a:libtiff:libtiff:4.0.6", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2016-5314", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5314", }, { cve: "CVE-2016-5315", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5315", }, { cve: "CVE-2016-5316", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5316", }, { cve: "CVE-2016-5317", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5317", }, { cve: "CVE-2016-5320", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5320", }, { cve: "CVE-2016-5321", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5321", }, { cve: "CVE-2016-5322", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5322", }, { cve: "CVE-2016-5323", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5323", }, ], }
wid-sec-w-2023-2409
Vulnerability from csaf_certbund
Published
2016-06-14 22:00
Modified
2023-10-08 22:00
Summary
libTIFF: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
libTIFF ist ein Softwarepaket für die Verarbeitung von Bilddateien in Tag Image File Format (TIFF).
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in libTIFF ausnutzen, um beliebigen Programmcode mit den Rechten des Dienstes auszuführen oder um einen Denial of Service Zustand hervorzurufen.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "libTIFF ist ein Softwarepaket für die Verarbeitung von Bilddateien in Tag Image File Format (TIFF).", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in libTIFF ausnutzen, um beliebigen Programmcode mit den Rechten des Dienstes auszuführen oder um einen Denial of Service Zustand hervorzurufen.", title: "Angriff", }, { category: "general", text: "- UNIX\n- Linux\n- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-2409 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2016/wid-sec-w-2023-2409.json", }, { category: "self", summary: "WID-SEC-2023-2409 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2409", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2023-1855 vom 2023-10-06", url: "https://alas.aws.amazon.com/ALAS-2023-1855.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS2-2023-2263 vom 2023-09-21", url: "https://alas.aws.amazon.com/AL2/ALAS-2023-2263.html", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/1", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/2", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/3", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/5", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/6", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/7", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/8", }, { category: "external", summary: "OSS Security Mailing List vom 2016-06-14", url: "http://www.openwall.com/lists/oss-security/2016/06/15/9", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2016:1546 vom 2016-08-03", url: "https://rhn.redhat.com/errata/RHSA-2016-1546.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2016:1547 vom 2016-08-03", url: "https://rhn.redhat.com/errata/RHSA-2016-1547.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2016:2271-1 vom 2016-09-10", url: "https://www.suse.com/support/update/announcement/2016/suse-su-20162271-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2016:2527-1 vom 2016-10-13", url: "https://www.suse.com/support/update/announcement/2016/suse-su-20162527-1.html", }, { category: "external", summary: "F5 Security Advisory SOL89096577 vom 2016-11-08", url: "https://support.f5.com/kb/en-us/solutions/public/k/89/sol89096577.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2016:3301-1 vom 2016-12-30", url: "https://www.suse.com/support/update/announcement/2016/suse-su-20163301-1.html", }, { category: "external", summary: "Debian Security Advisory DSA-3762 vom 2017-01-14", url: "https://www.debian.org/security/2017/dsa-3762", }, { category: "external", summary: "Ubuntu Security Notice USN-3212-1 vom 2017-02-27", url: "http://www.ubuntu.com/usn/usn-3212-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-3212-2 vom 2017-05-30", url: "http://www.ubuntu.com/usn/usn-3212-2/", }, { category: "external", summary: "Ubuntu Security Notice USN-3212-3 vom 2017-07-19", url: "http://www.ubuntu.com/usn/usn-3212-3/", }, { category: "external", summary: "Ubuntu Security Notice USN-3212-4 vom 2017-08-07", url: "http://www.ubuntu.com/usn/usn-3212-4/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2018:1472-1 vom 2018-05-31", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20181472-1.html", }, { category: "external", summary: "Juniper Security Advisory JSA11023 vom 2020-07-08", url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA11023", }, ], source_lang: "en-US", title: "libTIFF: Mehrere Schwachstellen", tracking: { current_release_date: "2023-10-08T22:00:00.000+00:00", generator: { date: "2024-08-15T17:58:41.982+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-2409", initial_release_date: "2016-06-14T22:00:00.000+00:00", revision_history: [ { date: "2016-06-14T22:00:00.000+00:00", number: "1", summary: "Initial Release", }, { date: "2016-06-14T22:00:00.000+00:00", number: "2", summary: "Version nicht vorhanden", }, { date: "2016-06-14T22:00:00.000+00:00", number: "3", summary: "Version nicht vorhanden", }, { date: "2016-08-02T22:00:00.000+00:00", number: "4", summary: "New remediations available", }, { date: "2016-08-02T22:00:00.000+00:00", number: "5", summary: "Version nicht vorhanden", }, { date: "2016-08-02T22:00:00.000+00:00", number: "6", summary: "Version nicht vorhanden", }, { date: "2016-08-02T22:00:00.000+00:00", number: "7", summary: "Version nicht vorhanden", }, { date: "2016-09-11T22:00:00.000+00:00", number: "8", summary: "New remediations available", }, { date: "2016-10-13T22:00:00.000+00:00", number: "9", summary: "New remediations available", }, { date: "2016-11-08T23:00:00.000+00:00", number: "10", summary: "New remediations available", }, { date: "2016-11-08T23:00:00.000+00:00", number: "11", summary: "Version nicht vorhanden", }, { date: "2016-12-29T23:00:00.000+00:00", number: "12", summary: "New remediations available", }, { date: "2017-01-15T23:00:00.000+00:00", number: "13", summary: "New remediations available", }, { date: "2017-02-27T23:00:00.000+00:00", number: "14", summary: "New remediations available", }, { date: "2017-05-30T22:00:00.000+00:00", number: "15", summary: "New remediations available", }, { date: "2017-07-19T22:00:00.000+00:00", number: "16", summary: "New remediations available", }, { date: "2017-08-07T22:00:00.000+00:00", number: "17", summary: "New remediations available", }, { date: "2018-05-31T22:00:00.000+00:00", number: "18", summary: "New remediations available", }, { date: "2020-07-08T22:00:00.000+00:00", number: "19", summary: "Neue Updates von Juniper aufgenommen", }, { date: "2023-09-20T22:00:00.000+00:00", number: "20", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2023-10-08T22:00:00.000+00:00", number: "21", summary: "Neue Updates von Amazon aufgenommen", }, ], status: "final", version: "21", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "F5 WebAccelerator", product: { name: "F5 WebAccelerator", product_id: "T001723", product_identification_helper: { cpe: "cpe:/h:f5:big-ip_webaccelerator:-", }, }, }, ], category: "vendor", name: "F5", }, { branches: [ { category: "product_name", name: "Juniper Junos Space < 20.1R1", product: { name: "Juniper Junos Space < 20.1R1", product_id: "T016874", product_identification_helper: { cpe: "cpe:/a:juniper:junos_space:20.1r1", }, }, }, ], category: "vendor", name: "Juniper", }, { branches: [ { category: "product_name", name: "Open Source CentOS", product: { name: "Open Source CentOS", product_id: "1727", product_identification_helper: { cpe: "cpe:/o:centos:centos:-", }, }, }, { category: "product_name", name: "Open Source libTIFF <= 4.0.6", product: { name: "Open Source libTIFF <= 4.0.6", product_id: "T006693", product_identification_helper: { cpe: "cpe:/a:libtiff:libtiff:4.0.6", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2016-5314", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5314", }, { cve: "CVE-2016-5315", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5315", }, { cve: "CVE-2016-5316", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5316", }, { cve: "CVE-2016-5317", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5317", }, { cve: "CVE-2016-5320", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5320", }, { cve: "CVE-2016-5321", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5321", }, { cve: "CVE-2016-5322", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5322", }, { cve: "CVE-2016-5323", notes: [ { category: "description", text: "In libTIFF existieren mehrere Schwachstellen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand hervorzurufen oder um möglicherweise beliebigen Code mit den Privilegien der libTIFF-nutzenden Applikation auszuführen. Bei den Schwachstellen handelt es sich um out-of-bound Lesefehlern, ungültigen Lesezugriffen und divide-by-zero-Fehlern.", }, ], product_status: { known_affected: [ "2951", "T001723", "T002207", "67646", "T000126", "398363", "1727", ], last_affected: [ "T006693", ], }, release_date: "2016-06-14T22:00:00.000+00:00", title: "CVE-2016-5323", }, ], }
fkie_cve-2016-5323
Vulnerability from fkie_nvd
Published
2017-01-20 15:59
Modified
2024-11-21 02:54
Severity ?
Summary
The _TIFFFax3fillruns function in libtiff before 4.0.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted Tiff image.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html | Third Party Advisory | |
cve@mitre.org | http://www.debian.org/security/2017/dsa-3762 | ||
cve@mitre.org | http://www.openwall.com/lists/oss-security/2016/06/15/6 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/91196 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://security.gentoo.org/glsa/201701-16 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2017/dsa-3762 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/06/15/6 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/91196 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201701-16 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*", matchCriteriaId: "7DBB051D-E94D-4553-88A6-750BE80B7617", versionEndIncluding: "4.0.6", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", matchCriteriaId: "03117DF1-3BEC-4B8D-AD63-DBBDB2126081", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The _TIFFFax3fillruns function in libtiff before 4.0.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted Tiff image.", }, { lang: "es", value: "La función _TIFFFax3fillruns en libtiff en versiones anteriores a 4.0.6 permite a atacantes remotos provocar una denegación de servicio (error de división por cero y caída de aplicación) a través de una imagen Tiff manipulada.", }, ], id: "CVE-2016-5323", lastModified: "2024-11-21T02:54:06.230", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-01-20T15:59:00.520", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2017/dsa-3762", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2016/06/15/6", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/91196", }, { source: "cve@mitre.org", url: "https://security.gentoo.org/glsa/201701-16", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2017/dsa-3762", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2016/06/15/6", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/91196", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.gentoo.org/glsa/201701-16", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-369", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
gsd-2016-5323
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
The _TIFFFax3fillruns function in libtiff before 4.0.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted Tiff image.
Aliases
Aliases
{ GSD: { alias: "CVE-2016-5323", description: "The _TIFFFax3fillruns function in libtiff before 4.0.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted Tiff image.", id: "GSD-2016-5323", references: [ "https://www.suse.com/security/cve/CVE-2016-5323.html", "https://www.debian.org/security/2017/dsa-3762", "https://ubuntu.com/security/CVE-2016-5323", "https://advisories.mageia.org/CVE-2016-5323.html", "https://security.archlinux.org/CVE-2016-5323", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2016-5323", ], details: "The _TIFFFax3fillruns function in libtiff before 4.0.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted Tiff image.", id: "GSD-2016-5323", modified: "2023-12-13T01:21:25.272938Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-5323", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The _TIFFFax3fillruns function in libtiff before 4.0.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted Tiff image.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "91196", refsource: "BID", url: "http://www.securityfocus.com/bid/91196", }, { name: "[oss-security] 20160615 CVE-2016-5323: libtiff 4.0.6 tiffcrop _TIFFFax3fillruns(): divide by zero", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2016/06/15/6", }, { name: "openSUSE-SU-2016:3035", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html", }, { name: "GLSA-201701-16", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201701-16", }, { name: "DSA-3762", refsource: "DEBIAN", url: "http://www.debian.org/security/2017/dsa-3762", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "4.0.6", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-5323", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "The _TIFFFax3fillruns function in libtiff before 4.0.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted Tiff image.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-369", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20160615 CVE-2016-5323: libtiff 4.0.6 tiffcrop _TIFFFax3fillruns(): divide by zero", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2016/06/15/6", }, { name: "openSUSE-SU-2016:3035", refsource: "SUSE", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html", }, { name: "91196", refsource: "BID", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/91196", }, { name: "GLSA-201701-16", refsource: "GENTOO", tags: [], url: "https://security.gentoo.org/glsa/201701-16", }, { name: "DSA-3762", refsource: "DEBIAN", tags: [], url: "http://www.debian.org/security/2017/dsa-3762", }, ], }, }, impact: { baseMetricV2: { cvssV2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, }, }, lastModifiedDate: "2018-10-30T16:27Z", publishedDate: "2017-01-20T15:59Z", }, }, }
suse-su-2016:3301-1
Vulnerability from csaf_suse
Published
2016-12-29 19:48
Modified
2016-12-29 19:48
Summary
Security update for tiff
Notes
Title of the patch
Security update for tiff
Description of the patch
The tiff library and tools were updated to version 4.0.7 fixing various bug and security issues.
- CVE-2014-8127: out-of-bounds read with malformed TIFF image in multiple tools [bnc#914890]
- CVE-2016-9297: tif_dirread.c read outside buffer in _TIFFPrintField() [bnc#1010161]
- CVE-2016-3658: Illegal read in TIFFWriteDirectoryTagLongLong8Array function in tiffset / tif_dirwrite.c [bnc#974840]
- CVE-2016-9273: heap overflow [bnc#1010163]
- CVE-2016-3622: divide By Zero in the tiff2rgba tool [bnc#974449]
- CVE-2016-5652: tiff2pdf JPEG Compression Tables Heap Buffer Overflow [bnc#1007280]
- CVE-2016-9453: out-of-bounds Write memcpy and less bound check in tiff2pdf [bnc#1011107]
- CVE-2016-5875: heap-based buffer overflow when using the PixarLog compressionformat [bnc#987351]
- CVE-2016-9448: regression introduced by fixing CVE-2016-9297 [bnc#1011103]
- CVE-2016-5321: out-of-bounds read in tiffcrop / DumpModeDecode() function [bnc#984813]
- CVE-2016-5323: Divide-by-zero in _TIFFFax3fillruns() function (null ptr dereference?) [bnc#984815]
Patchnames
SUSE-SLE-DESKTOP-12-SP1-2016-1937,SUSE-SLE-DESKTOP-12-SP2-2016-1937,SUSE-SLE-RPI-12-SP2-2016-1937,SUSE-SLE-SDK-12-SP1-2016-1937,SUSE-SLE-SDK-12-SP2-2016-1937,SUSE-SLE-SERVER-12-SP1-2016-1937,SUSE-SLE-SERVER-12-SP2-2016-1937
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for tiff", title: "Title of the patch", }, { category: "description", text: "\nThe tiff library and tools were updated to version 4.0.7 fixing various bug and security issues.\n\n- CVE-2014-8127: out-of-bounds read with malformed TIFF image in multiple tools [bnc#914890]\n- CVE-2016-9297: tif_dirread.c read outside buffer in _TIFFPrintField() [bnc#1010161]\n- CVE-2016-3658: Illegal read in TIFFWriteDirectoryTagLongLong8Array function in tiffset / tif_dirwrite.c [bnc#974840]\n- CVE-2016-9273: heap overflow [bnc#1010163]\n- CVE-2016-3622: divide By Zero in the tiff2rgba tool [bnc#974449]\n- CVE-2016-5652: tiff2pdf JPEG Compression Tables Heap Buffer Overflow [bnc#1007280]\n- CVE-2016-9453: out-of-bounds Write memcpy and less bound check in tiff2pdf [bnc#1011107]\n- CVE-2016-5875: heap-based buffer overflow when using the PixarLog compressionformat [bnc#987351]\n- CVE-2016-9448: regression introduced by fixing CVE-2016-9297 [bnc#1011103]\n- CVE-2016-5321: out-of-bounds read in tiffcrop / DumpModeDecode() function [bnc#984813]\n- CVE-2016-5323: Divide-by-zero in _TIFFFax3fillruns() function (null ptr dereference?) [bnc#984815]\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-DESKTOP-12-SP1-2016-1937,SUSE-SLE-DESKTOP-12-SP2-2016-1937,SUSE-SLE-RPI-12-SP2-2016-1937,SUSE-SLE-SDK-12-SP1-2016-1937,SUSE-SLE-SDK-12-SP2-2016-1937,SUSE-SLE-SERVER-12-SP1-2016-1937,SUSE-SLE-SERVER-12-SP2-2016-1937", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3301-1.json", }, { category: "self", summary: "URL for SUSE-SU-2016:3301-1", url: "https://www.suse.com/support/update/announcement/2016/suse-su-20163301-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2016:3301-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html", }, { category: "self", summary: "SUSE Bug 1007280", url: "https://bugzilla.suse.com/1007280", }, { category: "self", summary: "SUSE Bug 1010161", url: "https://bugzilla.suse.com/1010161", }, { category: "self", summary: "SUSE Bug 1010163", url: "https://bugzilla.suse.com/1010163", }, { category: "self", summary: "SUSE Bug 1011103", url: "https://bugzilla.suse.com/1011103", }, { category: "self", summary: "SUSE Bug 1011107", url: "https://bugzilla.suse.com/1011107", }, { category: "self", summary: "SUSE Bug 914890", url: "https://bugzilla.suse.com/914890", }, { category: "self", summary: "SUSE Bug 974449", url: "https://bugzilla.suse.com/974449", }, { category: "self", summary: "SUSE Bug 974840", url: "https://bugzilla.suse.com/974840", }, { category: "self", summary: "SUSE Bug 984813", url: "https://bugzilla.suse.com/984813", }, { category: "self", summary: "SUSE Bug 984815", url: "https://bugzilla.suse.com/984815", }, { category: "self", summary: "SUSE Bug 987351", url: "https://bugzilla.suse.com/987351", }, { category: "self", summary: "SUSE CVE CVE-2014-8127 page", url: "https://www.suse.com/security/cve/CVE-2014-8127/", }, { category: "self", summary: "SUSE CVE CVE-2016-3622 page", url: "https://www.suse.com/security/cve/CVE-2016-3622/", }, { category: "self", summary: "SUSE CVE CVE-2016-3658 page", url: "https://www.suse.com/security/cve/CVE-2016-3658/", }, { category: "self", summary: "SUSE CVE CVE-2016-5321 page", url: "https://www.suse.com/security/cve/CVE-2016-5321/", }, { category: "self", summary: "SUSE CVE CVE-2016-5323 page", url: "https://www.suse.com/security/cve/CVE-2016-5323/", }, { category: "self", summary: "SUSE CVE CVE-2016-5652 page", url: "https://www.suse.com/security/cve/CVE-2016-5652/", }, { category: "self", summary: "SUSE CVE CVE-2016-5875 page", url: "https://www.suse.com/security/cve/CVE-2016-5875/", }, { category: "self", summary: "SUSE CVE CVE-2016-9273 page", url: "https://www.suse.com/security/cve/CVE-2016-9273/", }, { category: "self", summary: "SUSE CVE CVE-2016-9297 page", url: "https://www.suse.com/security/cve/CVE-2016-9297/", }, { category: "self", summary: "SUSE CVE CVE-2016-9448 page", url: "https://www.suse.com/security/cve/CVE-2016-9448/", }, { category: "self", summary: "SUSE CVE CVE-2016-9453 page", url: "https://www.suse.com/security/cve/CVE-2016-9453/", }, ], title: "Security update for tiff", tracking: { current_release_date: "2016-12-29T19:48:15Z", generator: { date: "2016-12-29T19:48:15Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2016:3301-1", initial_release_date: "2016-12-29T19:48:15Z", revision_history: [ { date: "2016-12-29T19:48:15Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libtiff5-4.0.7-35.1.aarch64", product: { name: "libtiff5-4.0.7-35.1.aarch64", product_id: "libtiff5-4.0.7-35.1.aarch64", }, }, { category: "product_version", name: "tiff-4.0.7-35.1.aarch64", product: { name: "tiff-4.0.7-35.1.aarch64", product_id: "tiff-4.0.7-35.1.aarch64", }, }, { category: "product_version", name: "libtiff-devel-4.0.7-35.1.aarch64", product: { name: "libtiff-devel-4.0.7-35.1.aarch64", product_id: "libtiff-devel-4.0.7-35.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "libtiff-devel-4.0.7-35.1.ppc64le", product: { name: "libtiff-devel-4.0.7-35.1.ppc64le", product_id: "libtiff-devel-4.0.7-35.1.ppc64le", }, }, { category: "product_version", name: "libtiff5-4.0.7-35.1.ppc64le", product: { name: "libtiff5-4.0.7-35.1.ppc64le", product_id: "libtiff5-4.0.7-35.1.ppc64le", }, }, { category: "product_version", name: "tiff-4.0.7-35.1.ppc64le", product: { name: "tiff-4.0.7-35.1.ppc64le", product_id: "tiff-4.0.7-35.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "libtiff-devel-4.0.7-35.1.s390x", product: { name: "libtiff-devel-4.0.7-35.1.s390x", product_id: "libtiff-devel-4.0.7-35.1.s390x", }, }, { category: "product_version", name: "libtiff5-4.0.7-35.1.s390x", product: { name: "libtiff5-4.0.7-35.1.s390x", product_id: "libtiff5-4.0.7-35.1.s390x", }, }, { category: "product_version", name: "libtiff5-32bit-4.0.7-35.1.s390x", product: { name: "libtiff5-32bit-4.0.7-35.1.s390x", product_id: "libtiff5-32bit-4.0.7-35.1.s390x", }, }, { category: "product_version", name: "tiff-4.0.7-35.1.s390x", product: { name: "tiff-4.0.7-35.1.s390x", product_id: "tiff-4.0.7-35.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "libtiff5-4.0.7-35.1.x86_64", product: { name: "libtiff5-4.0.7-35.1.x86_64", product_id: "libtiff5-4.0.7-35.1.x86_64", }, }, { category: "product_version", name: "libtiff5-32bit-4.0.7-35.1.x86_64", product: { name: "libtiff5-32bit-4.0.7-35.1.x86_64", product_id: "libtiff5-32bit-4.0.7-35.1.x86_64", }, }, { category: "product_version", name: "libtiff-devel-4.0.7-35.1.x86_64", product: { name: "libtiff-devel-4.0.7-35.1.x86_64", product_id: "libtiff-devel-4.0.7-35.1.x86_64", }, }, { category: "product_version", name: "tiff-4.0.7-35.1.x86_64", product: { name: "tiff-4.0.7-35.1.x86_64", product_id: "tiff-4.0.7-35.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Desktop 12 SP1", product: { name: "SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sled:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Desktop 12 SP2", product: { name: "SUSE Linux Enterprise Desktop 12 SP2", product_id: "SUSE Linux Enterprise Desktop 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sled:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", product: { name: "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", product_id: "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP1", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP1", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP2", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP2", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP1", product: { name: "SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2", product: { name: "SUSE Linux Enterprise Server 12 SP2", product_id: "SUSE Linux Enterprise Server 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.7-35.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", }, product_reference: "libtiff5-4.0.7-35.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libtiff5-32bit-4.0.7-35.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", }, product_reference: "libtiff5-32bit-4.0.7-35.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.7-35.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2", product_id: "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", }, product_reference: "libtiff5-4.0.7-35.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP2", }, { category: "default_component_of", full_product_name: { name: "libtiff5-32bit-4.0.7-35.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2", product_id: "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", }, product_reference: "libtiff5-32bit-4.0.7-35.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP2", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.7-35.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", product_id: "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", }, product_reference: "libtiff5-4.0.7-35.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", }, { category: "default_component_of", full_product_name: { name: "tiff-4.0.7-35.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", product_id: "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", }, product_reference: "tiff-4.0.7-35.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-4.0.7-35.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", }, product_reference: "libtiff-devel-4.0.7-35.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-4.0.7-35.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", }, product_reference: "libtiff-devel-4.0.7-35.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-4.0.7-35.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", }, product_reference: "libtiff-devel-4.0.7-35.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-4.0.7-35.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", }, product_reference: "libtiff-devel-4.0.7-35.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP2", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-4.0.7-35.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP2", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", }, product_reference: "libtiff-devel-4.0.7-35.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP2", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-4.0.7-35.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP2", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", }, product_reference: "libtiff-devel-4.0.7-35.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP2", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-4.0.7-35.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", }, product_reference: "libtiff-devel-4.0.7-35.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP2", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.7-35.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", }, product_reference: "libtiff5-4.0.7-35.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.7-35.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", }, product_reference: "libtiff5-4.0.7-35.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.7-35.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", }, product_reference: "libtiff5-4.0.7-35.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libtiff5-32bit-4.0.7-35.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", }, product_reference: "libtiff5-32bit-4.0.7-35.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libtiff5-32bit-4.0.7-35.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", }, product_reference: "libtiff5-32bit-4.0.7-35.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "tiff-4.0.7-35.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", }, product_reference: "tiff-4.0.7-35.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "tiff-4.0.7-35.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", }, product_reference: "tiff-4.0.7-35.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "tiff-4.0.7-35.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", }, product_reference: "tiff-4.0.7-35.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.7-35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", }, product_reference: "libtiff5-4.0.7-35.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.7-35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", }, product_reference: "libtiff5-4.0.7-35.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.7-35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", }, product_reference: "libtiff5-4.0.7-35.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libtiff5-32bit-4.0.7-35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", }, product_reference: "libtiff5-32bit-4.0.7-35.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libtiff5-32bit-4.0.7-35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", }, product_reference: "libtiff5-32bit-4.0.7-35.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "tiff-4.0.7-35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", }, product_reference: "tiff-4.0.7-35.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "tiff-4.0.7-35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", }, product_reference: "tiff-4.0.7-35.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "tiff-4.0.7-35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", }, product_reference: "tiff-4.0.7-35.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.7-35.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2", product_id: "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", }, product_reference: "libtiff5-4.0.7-35.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.7-35.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2", product_id: "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", }, product_reference: "libtiff5-4.0.7-35.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.7-35.1.s390x as component of SUSE Linux Enterprise Server 12 SP2", product_id: "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", }, product_reference: "libtiff5-4.0.7-35.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.7-35.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2", product_id: "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", }, product_reference: "libtiff5-4.0.7-35.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2", }, { category: "default_component_of", full_product_name: { name: "libtiff5-32bit-4.0.7-35.1.s390x as component of SUSE Linux Enterprise Server 12 SP2", product_id: "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", }, product_reference: "libtiff5-32bit-4.0.7-35.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2", }, { category: "default_component_of", full_product_name: { name: "libtiff5-32bit-4.0.7-35.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2", product_id: "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", }, product_reference: "libtiff5-32bit-4.0.7-35.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2", }, { category: "default_component_of", full_product_name: { name: "tiff-4.0.7-35.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2", product_id: "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", }, product_reference: "tiff-4.0.7-35.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2", }, { category: "default_component_of", full_product_name: { name: "tiff-4.0.7-35.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2", product_id: "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", }, product_reference: "tiff-4.0.7-35.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2", }, { category: "default_component_of", full_product_name: { name: "tiff-4.0.7-35.1.s390x as component of SUSE Linux Enterprise Server 12 SP2", product_id: "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", }, product_reference: "tiff-4.0.7-35.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2", }, { category: "default_component_of", full_product_name: { name: "tiff-4.0.7-35.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2", product_id: "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", }, product_reference: "tiff-4.0.7-35.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.7-35.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", }, product_reference: "libtiff5-4.0.7-35.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.7-35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", }, product_reference: "libtiff5-4.0.7-35.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.7-35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", }, product_reference: "libtiff5-4.0.7-35.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.7-35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", }, product_reference: "libtiff5-4.0.7-35.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "libtiff5-32bit-4.0.7-35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", }, product_reference: "libtiff5-32bit-4.0.7-35.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "libtiff5-32bit-4.0.7-35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", }, product_reference: "libtiff5-32bit-4.0.7-35.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "tiff-4.0.7-35.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", }, product_reference: "tiff-4.0.7-35.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "tiff-4.0.7-35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", }, product_reference: "tiff-4.0.7-35.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "tiff-4.0.7-35.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", }, product_reference: "tiff-4.0.7-35.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "tiff-4.0.7-35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", }, product_reference: "tiff-4.0.7-35.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, ], }, vulnerabilities: [ { cve: "CVE-2014-8127", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-8127", }, ], notes: [ { category: "general", text: "LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted TIFF image to the (1) checkInkNamesString function in tif_dir.c in the thumbnail tool, (2) compresscontig function in tiff2bw.c in the tiff2bw tool, (3) putcontig8bitCIELab function in tif_getimage.c in the tiff2rgba tool, LZWPreDecode function in tif_lzw.c in the (4) tiff2ps or (5) tiffdither tool, (6) NeXTDecode function in tif_next.c in the tiffmedian tool, or (7) TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-8127", url: "https://www.suse.com/security/cve/CVE-2014-8127", }, { category: "external", summary: "SUSE Bug 1206220 for CVE-2014-8127", url: "https://bugzilla.suse.com/1206220", }, { category: "external", summary: "SUSE Bug 914890 for CVE-2014-8127", url: "https://bugzilla.suse.com/914890", }, { category: "external", summary: "SUSE Bug 916925 for CVE-2014-8127", url: "https://bugzilla.suse.com/916925", }, { category: "external", summary: "SUSE Bug 942690 for CVE-2014-8127", url: "https://bugzilla.suse.com/942690", }, { category: "external", summary: "SUSE Bug 969783 for CVE-2014-8127", url: "https://bugzilla.suse.com/969783", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-12-29T19:48:15Z", details: "critical", }, ], title: "CVE-2014-8127", }, { cve: "CVE-2016-3622", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3622", }, ], notes: [ { category: "general", text: "The fpAcc function in tif_predict.c in the tiff2rgba tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted TIFF image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3622", url: "https://www.suse.com/security/cve/CVE-2016-3622", }, { category: "external", summary: "SUSE Bug 974449 for CVE-2016-3622", url: "https://bugzilla.suse.com/974449", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-12-29T19:48:15Z", details: "low", }, ], title: "CVE-2016-3622", }, { cve: "CVE-2016-3658", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3658", }, ], notes: [ { category: "general", text: "The TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via vectors involving the ma variable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3658", url: "https://www.suse.com/security/cve/CVE-2016-3658", }, { category: "external", summary: "SUSE Bug 974840 for CVE-2016-3658", url: "https://bugzilla.suse.com/974840", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-12-29T19:48:15Z", details: "low", }, ], title: "CVE-2016-3658", }, { cve: "CVE-2016-5321", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5321", }, ], notes: [ { category: "general", text: "The DumpModeDecode function in libtiff 4.0.6 and earlier allows attackers to cause a denial of service (invalid read and crash) via a crafted tiff image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5321", url: "https://www.suse.com/security/cve/CVE-2016-5321", }, { category: "external", summary: "SUSE Bug 984813 for CVE-2016-5321", url: "https://bugzilla.suse.com/984813", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-12-29T19:48:15Z", details: "moderate", }, ], title: "CVE-2016-5321", }, { cve: "CVE-2016-5323", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5323", }, ], notes: [ { category: "general", text: "The _TIFFFax3fillruns function in libtiff before 4.0.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted Tiff image.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5323", url: "https://www.suse.com/security/cve/CVE-2016-5323", }, { category: "external", summary: "SUSE Bug 984815 for CVE-2016-5323", url: "https://bugzilla.suse.com/984815", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-12-29T19:48:15Z", details: "moderate", }, ], title: "CVE-2016-5323", }, { cve: "CVE-2016-5652", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5652", }, ], notes: [ { category: "general", text: "An exploitable heap-based buffer overflow exists in the handling of TIFF images in LibTIFF's TIFF2PDF tool. A crafted TIFF document can lead to a heap-based buffer overflow resulting in remote code execution. Vulnerability can be triggered via a saved TIFF file delivered by other means.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5652", url: "https://www.suse.com/security/cve/CVE-2016-5652", }, { category: "external", summary: "SUSE Bug 1007280 for CVE-2016-5652", url: "https://bugzilla.suse.com/1007280", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-12-29T19:48:15Z", details: "moderate", }, ], title: "CVE-2016-5652", }, { cve: "CVE-2016-5875", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5875", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-5314. Reason: This candidate is a reservation duplicate of CVE-2016-5314. Notes: All CVE users should reference CVE-2016-5314 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5875", url: "https://www.suse.com/security/cve/CVE-2016-5875", }, { category: "external", summary: "SUSE Bug 1007284 for CVE-2016-5875", url: "https://bugzilla.suse.com/1007284", }, { category: "external", summary: "SUSE Bug 984809 for CVE-2016-5875", url: "https://bugzilla.suse.com/984809", }, { category: "external", summary: "SUSE Bug 984831 for CVE-2016-5875", url: "https://bugzilla.suse.com/984831", }, { category: "external", summary: "SUSE Bug 987351 for CVE-2016-5875", url: "https://bugzilla.suse.com/987351", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-12-29T19:48:15Z", details: "moderate", }, ], title: "CVE-2016-5875", }, { cve: "CVE-2016-9273", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9273", }, ], notes: [ { category: "general", text: "tiffsplit in libtiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file, related to changing td_nstrips in TIFF_STRIPCHOP mode.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9273", url: "https://www.suse.com/security/cve/CVE-2016-9273", }, { category: "external", summary: "SUSE Bug 1010163 for CVE-2016-9273", url: "https://bugzilla.suse.com/1010163", }, { category: "external", summary: "SUSE Bug 1017693 for CVE-2016-9273", url: "https://bugzilla.suse.com/1017693", }, { category: "external", summary: "SUSE Bug 1150480 for CVE-2016-9273", url: "https://bugzilla.suse.com/1150480", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-12-29T19:48:15Z", details: "moderate", }, ], title: "CVE-2016-9273", }, { cve: "CVE-2016-9297", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9297", }, ], notes: [ { category: "general", text: "The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via crafted TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII tag values.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9297", url: "https://www.suse.com/security/cve/CVE-2016-9297", }, { category: "external", summary: "SUSE Bug 1010161 for CVE-2016-9297", url: "https://bugzilla.suse.com/1010161", }, { category: "external", summary: "SUSE Bug 1011103 for CVE-2016-9297", url: "https://bugzilla.suse.com/1011103", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-12-29T19:48:15Z", details: "moderate", }, ], title: "CVE-2016-9297", }, { cve: "CVE-2016-9448", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9448", }, ], notes: [ { category: "general", text: "The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by setting the tags TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII to values that access 0-byte arrays. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9297.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9448", url: "https://www.suse.com/security/cve/CVE-2016-9448", }, { category: "external", summary: "SUSE Bug 1010161 for CVE-2016-9448", url: "https://bugzilla.suse.com/1010161", }, { category: "external", summary: "SUSE Bug 1011103 for CVE-2016-9448", url: "https://bugzilla.suse.com/1011103", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-12-29T19:48:15Z", details: "moderate", }, ], title: "CVE-2016-9448", }, { cve: "CVE-2016-9453", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9453", }, ], notes: [ { category: "general", text: "The t2p_readwrite_pdf_image_tile function in LibTIFF allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a JPEG file with a TIFFTAG_JPEGTABLES of length one.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9453", url: "https://www.suse.com/security/cve/CVE-2016-9453", }, { category: "external", summary: "SUSE Bug 1007280 for CVE-2016-9453", url: "https://bugzilla.suse.com/1007280", }, { category: "external", summary: "SUSE Bug 1011107 for CVE-2016-9453", url: "https://bugzilla.suse.com/1011107", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-32bit-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libtiff5-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:tiff-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libtiff-devel-4.0.7-35.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libtiff-devel-4.0.7-35.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2016-12-29T19:48:15Z", details: "important", }, ], title: "CVE-2016-9453", }, ], }
opensuse-su-2024:10554-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
libtiff-devel-32bit-4.0.7-1.1 on GA media
Notes
Title of the patch
libtiff-devel-32bit-4.0.7-1.1 on GA media
Description of the patch
These are all security issues fixed in the libtiff-devel-32bit-4.0.7-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10554
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "libtiff-devel-32bit-4.0.7-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the libtiff-devel-32bit-4.0.7-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-10554", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10554-1.json", }, { category: "self", summary: "SUSE CVE CVE-2009-2285 page", url: "https://www.suse.com/security/cve/CVE-2009-2285/", }, { category: "self", summary: "SUSE CVE CVE-2009-2347 page", url: "https://www.suse.com/security/cve/CVE-2009-2347/", }, { category: "self", summary: "SUSE CVE CVE-2010-2065 page", url: "https://www.suse.com/security/cve/CVE-2010-2065/", }, { category: "self", summary: "SUSE CVE CVE-2010-2067 page", url: "https://www.suse.com/security/cve/CVE-2010-2067/", }, { category: "self", summary: "SUSE CVE CVE-2010-2233 page", url: "https://www.suse.com/security/cve/CVE-2010-2233/", }, { category: "self", summary: "SUSE CVE CVE-2010-4665 page", url: "https://www.suse.com/security/cve/CVE-2010-4665/", }, { category: "self", summary: "SUSE CVE CVE-2011-0192 page", url: "https://www.suse.com/security/cve/CVE-2011-0192/", }, { category: "self", summary: "SUSE CVE CVE-2011-1167 page", url: "https://www.suse.com/security/cve/CVE-2011-1167/", }, { category: "self", summary: "SUSE CVE CVE-2012-1173 page", url: "https://www.suse.com/security/cve/CVE-2012-1173/", }, { category: "self", summary: "SUSE CVE CVE-2012-2113 page", url: "https://www.suse.com/security/cve/CVE-2012-2113/", }, { category: "self", summary: "SUSE CVE CVE-2012-3401 page", url: "https://www.suse.com/security/cve/CVE-2012-3401/", }, { category: "self", summary: "SUSE CVE CVE-2012-4564 page", url: "https://www.suse.com/security/cve/CVE-2012-4564/", }, { category: "self", summary: "SUSE CVE CVE-2013-1960 page", url: "https://www.suse.com/security/cve/CVE-2013-1960/", }, { category: "self", summary: "SUSE CVE CVE-2013-1961 page", url: "https://www.suse.com/security/cve/CVE-2013-1961/", }, { category: "self", summary: "SUSE CVE CVE-2013-4231 page", url: "https://www.suse.com/security/cve/CVE-2013-4231/", }, { category: "self", summary: "SUSE CVE CVE-2013-4232 page", url: "https://www.suse.com/security/cve/CVE-2013-4232/", }, { category: "self", summary: "SUSE CVE CVE-2013-4243 page", url: "https://www.suse.com/security/cve/CVE-2013-4243/", }, { category: "self", summary: "SUSE CVE CVE-2013-4244 page", url: "https://www.suse.com/security/cve/CVE-2013-4244/", }, { category: "self", summary: "SUSE CVE CVE-2014-8127 page", url: "https://www.suse.com/security/cve/CVE-2014-8127/", }, { category: "self", summary: "SUSE CVE CVE-2014-8128 page", url: "https://www.suse.com/security/cve/CVE-2014-8128/", }, { category: "self", summary: "SUSE CVE CVE-2014-8129 page", url: "https://www.suse.com/security/cve/CVE-2014-8129/", }, { category: "self", summary: "SUSE CVE CVE-2014-8130 page", url: "https://www.suse.com/security/cve/CVE-2014-8130/", }, { category: "self", summary: "SUSE CVE CVE-2014-9655 page", url: "https://www.suse.com/security/cve/CVE-2014-9655/", }, { category: "self", summary: "SUSE CVE CVE-2015-1547 page", url: "https://www.suse.com/security/cve/CVE-2015-1547/", }, { category: "self", summary: "SUSE CVE CVE-2015-7554 page", url: "https://www.suse.com/security/cve/CVE-2015-7554/", }, { category: "self", summary: "SUSE CVE CVE-2015-8665 page", url: "https://www.suse.com/security/cve/CVE-2015-8665/", }, { category: "self", summary: "SUSE CVE CVE-2015-8683 page", url: "https://www.suse.com/security/cve/CVE-2015-8683/", }, { category: "self", summary: "SUSE CVE CVE-2015-8781 page", url: "https://www.suse.com/security/cve/CVE-2015-8781/", }, { category: "self", summary: "SUSE CVE CVE-2015-8782 page", url: "https://www.suse.com/security/cve/CVE-2015-8782/", }, { category: "self", summary: "SUSE CVE CVE-2015-8783 page", url: "https://www.suse.com/security/cve/CVE-2015-8783/", }, { category: "self", summary: "SUSE CVE CVE-2016-3186 page", url: "https://www.suse.com/security/cve/CVE-2016-3186/", }, { category: "self", summary: "SUSE CVE CVE-2016-3622 page", url: "https://www.suse.com/security/cve/CVE-2016-3622/", }, { category: "self", summary: "SUSE CVE CVE-2016-3623 page", url: "https://www.suse.com/security/cve/CVE-2016-3623/", }, { category: "self", summary: "SUSE CVE CVE-2016-3658 page", url: "https://www.suse.com/security/cve/CVE-2016-3658/", }, { category: "self", summary: "SUSE CVE CVE-2016-3945 page", url: "https://www.suse.com/security/cve/CVE-2016-3945/", }, { category: "self", summary: "SUSE CVE CVE-2016-3990 page", url: "https://www.suse.com/security/cve/CVE-2016-3990/", }, { category: "self", summary: "SUSE CVE CVE-2016-3991 page", url: "https://www.suse.com/security/cve/CVE-2016-3991/", }, { category: "self", summary: "SUSE CVE CVE-2016-5314 page", url: "https://www.suse.com/security/cve/CVE-2016-5314/", }, { category: "self", summary: "SUSE CVE CVE-2016-5316 page", url: "https://www.suse.com/security/cve/CVE-2016-5316/", }, { category: "self", summary: "SUSE CVE CVE-2016-5317 page", url: "https://www.suse.com/security/cve/CVE-2016-5317/", }, { category: "self", summary: "SUSE CVE CVE-2016-5320 page", url: "https://www.suse.com/security/cve/CVE-2016-5320/", }, { category: "self", summary: "SUSE CVE CVE-2016-5321 page", url: "https://www.suse.com/security/cve/CVE-2016-5321/", }, { category: "self", summary: "SUSE CVE CVE-2016-5323 page", url: "https://www.suse.com/security/cve/CVE-2016-5323/", }, { category: "self", summary: "SUSE CVE CVE-2016-5652 page", url: "https://www.suse.com/security/cve/CVE-2016-5652/", }, { category: "self", summary: "SUSE CVE CVE-2016-5875 page", url: "https://www.suse.com/security/cve/CVE-2016-5875/", }, { category: "self", summary: "SUSE CVE CVE-2016-9273 page", url: "https://www.suse.com/security/cve/CVE-2016-9273/", }, { category: "self", summary: "SUSE CVE CVE-2016-9297 page", url: "https://www.suse.com/security/cve/CVE-2016-9297/", }, { category: "self", summary: "SUSE CVE CVE-2016-9448 page", url: "https://www.suse.com/security/cve/CVE-2016-9448/", }, { category: "self", summary: "SUSE CVE CVE-2016-9453 page", url: "https://www.suse.com/security/cve/CVE-2016-9453/", }, ], title: "libtiff-devel-32bit-4.0.7-1.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:10554-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libtiff-devel-4.0.7-1.1.aarch64", product: { name: "libtiff-devel-4.0.7-1.1.aarch64", product_id: "libtiff-devel-4.0.7-1.1.aarch64", }, }, { category: "product_version", name: "libtiff-devel-32bit-4.0.7-1.1.aarch64", product: { name: "libtiff-devel-32bit-4.0.7-1.1.aarch64", product_id: "libtiff-devel-32bit-4.0.7-1.1.aarch64", }, }, { category: "product_version", name: "libtiff5-4.0.7-1.1.aarch64", product: { name: "libtiff5-4.0.7-1.1.aarch64", product_id: "libtiff5-4.0.7-1.1.aarch64", }, }, { category: "product_version", name: "libtiff5-32bit-4.0.7-1.1.aarch64", product: { name: "libtiff5-32bit-4.0.7-1.1.aarch64", product_id: "libtiff5-32bit-4.0.7-1.1.aarch64", }, }, { category: "product_version", name: "tiff-4.0.7-1.1.aarch64", product: { name: "tiff-4.0.7-1.1.aarch64", product_id: "tiff-4.0.7-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "libtiff-devel-4.0.7-1.1.ppc64le", product: { name: "libtiff-devel-4.0.7-1.1.ppc64le", product_id: "libtiff-devel-4.0.7-1.1.ppc64le", }, }, { category: "product_version", name: "libtiff-devel-32bit-4.0.7-1.1.ppc64le", product: { name: "libtiff-devel-32bit-4.0.7-1.1.ppc64le", product_id: "libtiff-devel-32bit-4.0.7-1.1.ppc64le", }, }, { category: "product_version", name: "libtiff5-4.0.7-1.1.ppc64le", product: { name: "libtiff5-4.0.7-1.1.ppc64le", product_id: "libtiff5-4.0.7-1.1.ppc64le", }, }, { category: "product_version", name: "libtiff5-32bit-4.0.7-1.1.ppc64le", product: { name: "libtiff5-32bit-4.0.7-1.1.ppc64le", product_id: "libtiff5-32bit-4.0.7-1.1.ppc64le", }, }, { category: "product_version", name: "tiff-4.0.7-1.1.ppc64le", product: { name: "tiff-4.0.7-1.1.ppc64le", product_id: "tiff-4.0.7-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "libtiff-devel-4.0.7-1.1.s390x", product: { name: "libtiff-devel-4.0.7-1.1.s390x", product_id: "libtiff-devel-4.0.7-1.1.s390x", }, }, { category: "product_version", name: "libtiff-devel-32bit-4.0.7-1.1.s390x", product: { name: "libtiff-devel-32bit-4.0.7-1.1.s390x", product_id: "libtiff-devel-32bit-4.0.7-1.1.s390x", }, }, { category: "product_version", name: "libtiff5-4.0.7-1.1.s390x", product: { name: "libtiff5-4.0.7-1.1.s390x", product_id: "libtiff5-4.0.7-1.1.s390x", }, }, { category: "product_version", name: "libtiff5-32bit-4.0.7-1.1.s390x", product: { name: "libtiff5-32bit-4.0.7-1.1.s390x", product_id: "libtiff5-32bit-4.0.7-1.1.s390x", }, }, { category: "product_version", name: "tiff-4.0.7-1.1.s390x", product: { name: "tiff-4.0.7-1.1.s390x", product_id: "tiff-4.0.7-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "libtiff-devel-4.0.7-1.1.x86_64", product: { name: "libtiff-devel-4.0.7-1.1.x86_64", product_id: "libtiff-devel-4.0.7-1.1.x86_64", }, }, { category: "product_version", name: "libtiff-devel-32bit-4.0.7-1.1.x86_64", product: { name: "libtiff-devel-32bit-4.0.7-1.1.x86_64", product_id: "libtiff-devel-32bit-4.0.7-1.1.x86_64", }, }, { category: "product_version", name: "libtiff5-4.0.7-1.1.x86_64", product: { name: "libtiff5-4.0.7-1.1.x86_64", product_id: "libtiff5-4.0.7-1.1.x86_64", }, }, { category: "product_version", name: "libtiff5-32bit-4.0.7-1.1.x86_64", product: { name: "libtiff5-32bit-4.0.7-1.1.x86_64", product_id: "libtiff5-32bit-4.0.7-1.1.x86_64", }, }, { category: "product_version", name: "tiff-4.0.7-1.1.x86_64", product: { name: "tiff-4.0.7-1.1.x86_64", product_id: "tiff-4.0.7-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libtiff-devel-4.0.7-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", }, product_reference: "libtiff-devel-4.0.7-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-4.0.7-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", }, product_reference: "libtiff-devel-4.0.7-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-4.0.7-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", }, product_reference: "libtiff-devel-4.0.7-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-4.0.7-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", }, product_reference: "libtiff-devel-4.0.7-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-32bit-4.0.7-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", }, product_reference: "libtiff-devel-32bit-4.0.7-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-32bit-4.0.7-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", }, product_reference: "libtiff-devel-32bit-4.0.7-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-32bit-4.0.7-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", }, product_reference: "libtiff-devel-32bit-4.0.7-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff-devel-32bit-4.0.7-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", }, product_reference: "libtiff-devel-32bit-4.0.7-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.7-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", }, product_reference: "libtiff5-4.0.7-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.7-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", }, product_reference: "libtiff5-4.0.7-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.7-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", }, product_reference: "libtiff5-4.0.7-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff5-4.0.7-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", }, product_reference: "libtiff5-4.0.7-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff5-32bit-4.0.7-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", }, product_reference: "libtiff5-32bit-4.0.7-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff5-32bit-4.0.7-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", }, product_reference: "libtiff5-32bit-4.0.7-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff5-32bit-4.0.7-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", }, product_reference: "libtiff5-32bit-4.0.7-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libtiff5-32bit-4.0.7-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", }, product_reference: "libtiff5-32bit-4.0.7-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tiff-4.0.7-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", }, product_reference: "tiff-4.0.7-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tiff-4.0.7-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", }, product_reference: "tiff-4.0.7-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tiff-4.0.7-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", }, product_reference: "tiff-4.0.7-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tiff-4.0.7-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", }, product_reference: "tiff-4.0.7-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2009-2285", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-2285", }, ], notes: [ { category: "general", text: "Buffer underflow in the LZWDecodeCompat function in libtiff 3.8.2 allows context-dependent attackers to cause a denial of service (crash) via a crafted TIFF image, a different vulnerability than CVE-2008-2327.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2009-2285", url: "https://www.suse.com/security/cve/CVE-2009-2285", }, { category: "external", summary: "SUSE Bug 518698 for CVE-2009-2285", url: "https://bugzilla.suse.com/518698", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2009-2285", }, { cve: "CVE-2009-2347", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-2347", }, ], notes: [ { category: "general", text: "Multiple integer overflows in inter-color spaces conversion tools in libtiff 3.8 through 3.8.2, 3.9, and 4.0 allow context-dependent attackers to execute arbitrary code via a TIFF image with large (1) width and (2) height values, which triggers a heap-based buffer overflow in the (a) cvt_whole_image function in tiff2rgba and (b) tiffcvt function in rgb2ycbcr.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2009-2347", url: "https://www.suse.com/security/cve/CVE-2009-2347", }, { category: "external", summary: "SUSE Bug 519796 for CVE-2009-2347", url: "https://bugzilla.suse.com/519796", }, { category: "external", summary: "SUSE Bug 616827 for CVE-2009-2347", url: "https://bugzilla.suse.com/616827", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2009-2347", }, { cve: "CVE-2010-2065", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2010-2065", }, ], notes: [ { category: "general", text: "Integer overflow in the TIFFroundup macro in LibTIFF before 3.9.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TIFF file that triggers a buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2010-2065", url: "https://www.suse.com/security/cve/CVE-2010-2065", }, { category: "external", summary: "SUSE Bug 612787 for CVE-2010-2065", url: "https://bugzilla.suse.com/612787", }, { category: "external", summary: "SUSE Bug 612879 for CVE-2010-2065", url: "https://bugzilla.suse.com/612879", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2010-2065", }, { cve: "CVE-2010-2067", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2010-2067", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the TIFFFetchSubjectDistance function in tif_dirread.c in LibTIFF before 3.9.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long EXIF SubjectDistance field in a TIFF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2010-2067", url: "https://www.suse.com/security/cve/CVE-2010-2067", }, { category: "external", summary: "SUSE Bug 612787 for CVE-2010-2067", url: "https://bugzilla.suse.com/612787", }, { category: "external", summary: "SUSE Bug 612879 for CVE-2010-2067", url: "https://bugzilla.suse.com/612879", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2010-2067", }, { cve: "CVE-2010-2233", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2010-2233", }, ], notes: [ { category: "general", text: "tif_getimage.c in LibTIFF 3.9.0 and 3.9.2 on 64-bit platforms, as used in ImageMagick, does not properly perform vertical flips, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TIFF image, related to \"downsampled OJPEG input.\"", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2010-2233", url: "https://www.suse.com/security/cve/CVE-2010-2233", }, { category: "external", summary: "SUSE Bug 612879 for CVE-2010-2233", url: "https://bugzilla.suse.com/612879", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2010-2233", }, { cve: "CVE-2010-4665", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2010-4665", }, ], notes: [ { category: "general", text: "Integer overflow in the ReadDirectory function in tiffdump.c in tiffdump in LibTIFF before 3.9.5 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF file containing a directory data structure with many directory entries.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2010-4665", url: "https://www.suse.com/security/cve/CVE-2010-4665", }, { category: "external", summary: "SUSE Bug 687442 for CVE-2010-4665", url: "https://bugzilla.suse.com/687442", }, { category: "external", summary: "SUSE Bug 854393 for CVE-2010-4665", url: "https://bugzilla.suse.com/854393", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2010-4665", }, { cve: "CVE-2011-0192", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-0192", }, ], notes: [ { category: "general", text: "Buffer overflow in Fax4Decode in LibTIFF 3.9.4 and possibly other versions, as used in ImageIO in Apple iTunes before 10.2 on Windows and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF Internet Fax image file that has been compressed using CCITT Group 4 encoding, related to the EXPAND2D macro in libtiff/tif_fax3.h. NOTE: some of these details are obtained from third party information.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-0192", url: "https://www.suse.com/security/cve/CVE-2011-0192", }, { category: "external", summary: "SUSE Bug 672510 for CVE-2011-0192", url: "https://bugzilla.suse.com/672510", }, { category: "external", summary: "SUSE Bug 682053 for CVE-2011-0192", url: "https://bugzilla.suse.com/682053", }, { category: "external", summary: "SUSE Bug 682871 for CVE-2011-0192", url: "https://bugzilla.suse.com/682871", }, { category: "external", summary: "SUSE Bug 854393 for CVE-2011-0192", url: "https://bugzilla.suse.com/854393", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2011-0192", }, { cve: "CVE-2011-1167", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-1167", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the thunder (aka ThunderScan) decoder in tif_thunder.c in LibTIFF 3.9.4 and earlier allows remote attackers to execute arbitrary code via crafted THUNDER_2BITDELTAS data in a .tiff file that has an unexpected BitsPerSample value.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-1167", url: "https://www.suse.com/security/cve/CVE-2011-1167", }, { category: "external", summary: "SUSE Bug 683337 for CVE-2011-1167", url: "https://bugzilla.suse.com/683337", }, { category: "external", summary: "SUSE Bug 854393 for CVE-2011-1167", url: "https://bugzilla.suse.com/854393", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2011-1167", }, { cve: "CVE-2012-1173", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-1173", }, ], notes: [ { category: "general", text: "Multiple integer overflows in tiff_getimage.c in LibTIFF 3.9.4 allow remote attackers to execute arbitrary code via a crafted tile size in a TIFF file, which is not properly handled by the (1) gtTileSeparate or (2) gtStripSeparate function, leading to a heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-1173", url: "https://www.suse.com/security/cve/CVE-2012-1173", }, { category: "external", summary: "SUSE Bug 753362 for CVE-2012-1173", url: "https://bugzilla.suse.com/753362", }, { category: "external", summary: "SUSE Bug 767852 for CVE-2012-1173", url: "https://bugzilla.suse.com/767852", }, { category: "external", summary: "SUSE Bug 854393 for CVE-2012-1173", url: "https://bugzilla.suse.com/854393", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2012-1173", }, { cve: "CVE-2012-2113", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-2113", }, ], notes: [ { category: "general", text: "Multiple integer overflows in tiff2pdf in libtiff before 4.0.2 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-2113", url: "https://www.suse.com/security/cve/CVE-2012-2113", }, { category: "external", summary: "SUSE Bug 767852 for CVE-2012-2113", url: "https://bugzilla.suse.com/767852", }, { category: "external", summary: "SUSE Bug 854393 for CVE-2012-2113", url: "https://bugzilla.suse.com/854393", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2012-2113", }, { cve: "CVE-2012-3401", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-3401", }, ], notes: [ { category: "general", text: "The t2p_read_tiff_init function in tiff2pdf (tools/tiff2pdf.c) in LibTIFF 4.0.2 and earlier does not properly initialize the T2P context struct pointer in certain error conditions, which allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image that triggers a heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-3401", url: "https://www.suse.com/security/cve/CVE-2012-3401", }, { category: "external", summary: "SUSE Bug 770816 for CVE-2012-3401", url: "https://bugzilla.suse.com/770816", }, { category: "external", summary: "SUSE Bug 854393 for CVE-2012-3401", url: "https://bugzilla.suse.com/854393", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2012-3401", }, { cve: "CVE-2012-4564", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-4564", }, ], notes: [ { category: "general", text: "ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-4564", url: "https://www.suse.com/security/cve/CVE-2012-4564", }, { category: "external", summary: "SUSE Bug 781995 for CVE-2012-4564", url: "https://bugzilla.suse.com/781995", }, { category: "external", summary: "SUSE Bug 787892 for CVE-2012-4564", url: "https://bugzilla.suse.com/787892", }, { category: "external", summary: "SUSE Bug 791607 for CVE-2012-4564", url: "https://bugzilla.suse.com/791607", }, { category: "external", summary: "SUSE Bug 854393 for CVE-2012-4564", url: "https://bugzilla.suse.com/854393", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2012-4564", }, { cve: "CVE-2013-1960", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2013-1960", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the t2p_process_jpeg_strip function in tiff2pdf in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2013-1960", url: "https://www.suse.com/security/cve/CVE-2013-1960", }, { category: "external", summary: "SUSE Bug 817573 for CVE-2013-1960", url: "https://bugzilla.suse.com/817573", }, { category: "external", summary: "SUSE Bug 854393 for CVE-2013-1960", url: "https://bugzilla.suse.com/854393", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2013-1960", }, { cve: "CVE-2013-1961", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2013-1961", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the t2p_write_pdf_page function in tiff2pdf in libtiff before 4.0.3 allows remote attackers to cause a denial of service (application crash) via a crafted image length and resolution in a TIFF image file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2013-1961", url: "https://www.suse.com/security/cve/CVE-2013-1961", }, { category: "external", summary: "SUSE Bug 817573 for CVE-2013-1961", url: "https://bugzilla.suse.com/817573", }, { category: "external", summary: "SUSE Bug 818117 for CVE-2013-1961", url: "https://bugzilla.suse.com/818117", }, { category: "external", summary: "SUSE Bug 854393 for CVE-2013-1961", url: "https://bugzilla.suse.com/854393", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2013-1961", }, { cve: "CVE-2013-4231", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2013-4231", }, ], notes: [ { category: "general", text: "Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2013-4231", url: "https://www.suse.com/security/cve/CVE-2013-4231", }, { category: "external", summary: "SUSE Bug 834477 for CVE-2013-4231", url: "https://bugzilla.suse.com/834477", }, { category: "external", summary: "SUSE Bug 854393 for CVE-2013-4231", url: "https://bugzilla.suse.com/854393", }, { category: "external", summary: "SUSE Bug 969783 for CVE-2013-4231", url: "https://bugzilla.suse.com/969783", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2013-4231", }, { cve: "CVE-2013-4232", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2013-4232", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in the t2p_readwrite_pdf_image function in tools/tiff2pdf.c in libtiff 4.0.3 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted TIFF image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2013-4232", url: "https://www.suse.com/security/cve/CVE-2013-4232", }, { category: "external", summary: "SUSE Bug 834477 for CVE-2013-4232", url: "https://bugzilla.suse.com/834477", }, { category: "external", summary: "SUSE Bug 854393 for CVE-2013-4232", url: "https://bugzilla.suse.com/854393", }, { category: "external", summary: "SUSE Bug 969783 for CVE-2013-4232", url: "https://bugzilla.suse.com/969783", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2013-4232", }, { cve: "CVE-2013-4243", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2013-4243", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the readgifimage function in the gif2tiff tool in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted height and width values in a GIF image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2013-4243", url: "https://www.suse.com/security/cve/CVE-2013-4243", }, { category: "external", summary: "SUSE Bug 834779 for CVE-2013-4243", url: "https://bugzilla.suse.com/834779", }, { category: "external", summary: "SUSE Bug 854393 for CVE-2013-4243", url: "https://bugzilla.suse.com/854393", }, { category: "external", summary: "SUSE Bug 969783 for CVE-2013-4243", url: "https://bugzilla.suse.com/969783", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2013-4243", }, { cve: "CVE-2013-4244", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2013-4244", }, ], notes: [ { category: "general", text: "The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2013-4244", url: "https://www.suse.com/security/cve/CVE-2013-4244", }, { category: "external", summary: "SUSE Bug 834788 for CVE-2013-4244", url: "https://bugzilla.suse.com/834788", }, { category: "external", summary: "SUSE Bug 854393 for CVE-2013-4244", url: "https://bugzilla.suse.com/854393", }, { category: "external", summary: "SUSE Bug 969783 for CVE-2013-4244", url: "https://bugzilla.suse.com/969783", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2013-4244", }, { cve: "CVE-2014-8127", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-8127", }, ], notes: [ { category: "general", text: "LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted TIFF image to the (1) checkInkNamesString function in tif_dir.c in the thumbnail tool, (2) compresscontig function in tiff2bw.c in the tiff2bw tool, (3) putcontig8bitCIELab function in tif_getimage.c in the tiff2rgba tool, LZWPreDecode function in tif_lzw.c in the (4) tiff2ps or (5) tiffdither tool, (6) NeXTDecode function in tif_next.c in the tiffmedian tool, or (7) TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-8127", url: "https://www.suse.com/security/cve/CVE-2014-8127", }, { category: "external", summary: "SUSE Bug 1206220 for CVE-2014-8127", url: "https://bugzilla.suse.com/1206220", }, { category: "external", summary: "SUSE Bug 914890 for CVE-2014-8127", url: "https://bugzilla.suse.com/914890", }, { category: "external", summary: "SUSE Bug 916925 for CVE-2014-8127", url: "https://bugzilla.suse.com/916925", }, { category: "external", summary: "SUSE Bug 942690 for CVE-2014-8127", url: "https://bugzilla.suse.com/942690", }, { category: "external", summary: "SUSE Bug 969783 for CVE-2014-8127", url: "https://bugzilla.suse.com/969783", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2014-8127", }, { cve: "CVE-2014-8128", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-8128", }, ], notes: [ { category: "general", text: "LibTIFF prior to 4.0.4, as used in Apple iOS before 8.4 and OS X before 10.10.4 and other products, allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted TIFF image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-8128", url: "https://www.suse.com/security/cve/CVE-2014-8128", }, { category: "external", summary: "SUSE Bug 1007276 for CVE-2014-8128", url: "https://bugzilla.suse.com/1007276", }, { category: "external", summary: "SUSE Bug 1017690 for CVE-2014-8128", url: "https://bugzilla.suse.com/1017690", }, { category: "external", summary: "SUSE Bug 1040322 for CVE-2014-8128", url: "https://bugzilla.suse.com/1040322", }, { category: "external", summary: "SUSE Bug 1206220 for CVE-2014-8128", url: "https://bugzilla.suse.com/1206220", }, { category: "external", summary: "SUSE Bug 914890 for CVE-2014-8128", url: "https://bugzilla.suse.com/914890", }, { category: "external", summary: "SUSE Bug 916925 for CVE-2014-8128", url: "https://bugzilla.suse.com/916925", }, { category: "external", summary: "SUSE Bug 942690 for CVE-2014-8128", url: "https://bugzilla.suse.com/942690", }, { category: "external", summary: "SUSE Bug 960341 for CVE-2014-8128", url: "https://bugzilla.suse.com/960341", }, { category: "external", summary: "SUSE Bug 969783 for CVE-2014-8128", url: "https://bugzilla.suse.com/969783", }, { category: "external", summary: "SUSE Bug 974621 for CVE-2014-8128", url: "https://bugzilla.suse.com/974621", }, { category: "external", summary: "SUSE Bug 983436 for CVE-2014-8128", url: "https://bugzilla.suse.com/983436", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2014-8128", }, { cve: "CVE-2014-8129", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-8129", }, ], notes: [ { category: "general", text: "LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by failure of tif_next.c to verify that the BitsPerSample value is 2, and the t2p_sample_lab_signed_to_unsigned function in tiff2pdf.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-8129", url: "https://www.suse.com/security/cve/CVE-2014-8129", }, { category: "external", summary: "SUSE Bug 1206220 for CVE-2014-8129", url: "https://bugzilla.suse.com/1206220", }, { category: "external", summary: "SUSE Bug 914890 for CVE-2014-8129", url: "https://bugzilla.suse.com/914890", }, { category: "external", summary: "SUSE Bug 916925 for CVE-2014-8129", url: "https://bugzilla.suse.com/916925", }, { category: "external", summary: "SUSE Bug 942690 for CVE-2014-8129", url: "https://bugzilla.suse.com/942690", }, { category: "external", summary: "SUSE Bug 969783 for CVE-2014-8129", url: "https://bugzilla.suse.com/969783", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2014-8129", }, { cve: "CVE-2014-8130", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-8130", }, ], notes: [ { category: "general", text: "The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image that is mishandled by the TIFFWriteScanline function in tif_write.c, as demonstrated by tiffdither.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-8130", url: "https://www.suse.com/security/cve/CVE-2014-8130", }, { category: "external", summary: "SUSE Bug 1206220 for CVE-2014-8130", url: "https://bugzilla.suse.com/1206220", }, { category: "external", summary: "SUSE Bug 914890 for CVE-2014-8130", url: "https://bugzilla.suse.com/914890", }, { category: "external", summary: "SUSE Bug 916925 for CVE-2014-8130", url: "https://bugzilla.suse.com/916925", }, { category: "external", summary: "SUSE Bug 942690 for CVE-2014-8130", url: "https://bugzilla.suse.com/942690", }, { category: "external", summary: "SUSE Bug 969783 for CVE-2014-8130", url: "https://bugzilla.suse.com/969783", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2014-8130", }, { cve: "CVE-2014-9655", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-9655", }, ], notes: [ { category: "general", text: "The (1) putcontig8bitYCbCr21tile function in tif_getimage.c or (2) NeXTDecode function in tif_next.c in LibTIFF allows remote attackers to cause a denial of service (uninitialized memory access) via a crafted TIFF image, as demonstrated by libtiff-cvs-1.tif and libtiff-cvs-2.tif.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-9655", url: "https://www.suse.com/security/cve/CVE-2014-9655", }, { category: "external", summary: "SUSE Bug 1206220 for CVE-2014-9655", url: "https://bugzilla.suse.com/1206220", }, { category: "external", summary: "SUSE Bug 914890 for CVE-2014-9655", url: "https://bugzilla.suse.com/914890", }, { category: "external", summary: "SUSE Bug 916925 for CVE-2014-9655", url: "https://bugzilla.suse.com/916925", }, { category: "external", summary: "SUSE Bug 916927 for CVE-2014-9655", url: "https://bugzilla.suse.com/916927", }, { category: "external", summary: "SUSE Bug 969783 for CVE-2014-9655", url: "https://bugzilla.suse.com/969783", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2014-9655", }, { cve: "CVE-2015-1547", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-1547", }, ], notes: [ { category: "general", text: "The NeXTDecode function in tif_next.c in LibTIFF allows remote attackers to cause a denial of service (uninitialized memory access) via a crafted TIFF image, as demonstrated by libtiff5.tif.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-1547", url: "https://www.suse.com/security/cve/CVE-2015-1547", }, { category: "external", summary: "SUSE Bug 1206220 for CVE-2015-1547", url: "https://bugzilla.suse.com/1206220", }, { category: "external", summary: "SUSE Bug 914890 for CVE-2015-1547", url: "https://bugzilla.suse.com/914890", }, { category: "external", summary: "SUSE Bug 916925 for CVE-2015-1547", url: "https://bugzilla.suse.com/916925", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2015-1547", }, { cve: "CVE-2015-7554", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-7554", }, ], notes: [ { category: "general", text: "The _TIFFVGetField function in tif_dir.c in libtiff 4.0.6 allows attackers to cause a denial of service (invalid memory write and crash) or possibly have unspecified other impact via crafted field data in an extension tag in a TIFF image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-7554", url: "https://www.suse.com/security/cve/CVE-2015-7554", }, { category: "external", summary: "SUSE Bug 1007276 for CVE-2015-7554", url: "https://bugzilla.suse.com/1007276", }, { category: "external", summary: "SUSE Bug 1017690 for CVE-2015-7554", url: "https://bugzilla.suse.com/1017690", }, { category: "external", summary: "SUSE Bug 1040322 for CVE-2015-7554", url: "https://bugzilla.suse.com/1040322", }, { category: "external", summary: "SUSE Bug 960341 for CVE-2015-7554", url: "https://bugzilla.suse.com/960341", }, { category: "external", summary: "SUSE Bug 974621 for CVE-2015-7554", url: "https://bugzilla.suse.com/974621", }, { category: "external", summary: "SUSE Bug 983436 for CVE-2015-7554", url: "https://bugzilla.suse.com/983436", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2015-7554", }, { cve: "CVE-2015-8665", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8665", }, ], notes: [ { category: "general", text: "tif_getimage.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via the SamplesPerPixel tag in a TIFF image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8665", url: "https://www.suse.com/security/cve/CVE-2015-8665", }, { category: "external", summary: "SUSE Bug 1156749 for CVE-2015-8665", url: "https://bugzilla.suse.com/1156749", }, { category: "external", summary: "SUSE Bug 1156754 for CVE-2015-8665", url: "https://bugzilla.suse.com/1156754", }, { category: "external", summary: "SUSE Bug 1200195 for CVE-2015-8665", url: "https://bugzilla.suse.com/1200195", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2015-8665", }, { cve: "CVE-2015-8683", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8683", }, ], notes: [ { category: "general", text: "The putcontig8bitCIELab function in tif_getimage.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via a packed TIFF image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8683", url: "https://www.suse.com/security/cve/CVE-2015-8683", }, { category: "external", summary: "SUSE Bug 1156749 for CVE-2015-8683", url: "https://bugzilla.suse.com/1156749", }, { category: "external", summary: "SUSE Bug 1156754 for CVE-2015-8683", url: "https://bugzilla.suse.com/1156754", }, { category: "external", summary: "SUSE Bug 1200195 for CVE-2015-8683", url: "https://bugzilla.suse.com/1200195", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2015-8683", }, { cve: "CVE-2015-8781", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8781", }, ], notes: [ { category: "general", text: "tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds write) via an invalid number of samples per pixel in a LogL compressed TIFF image, a different vulnerability than CVE-2015-8782.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8781", url: "https://www.suse.com/security/cve/CVE-2015-8781", }, { category: "external", summary: "SUSE Bug 964213 for CVE-2015-8781", url: "https://bugzilla.suse.com/964213", }, { category: "external", summary: "SUSE Bug 964225 for CVE-2015-8781", url: "https://bugzilla.suse.com/964225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2015-8781", }, { cve: "CVE-2015-8782", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8782", }, ], notes: [ { category: "general", text: "tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds writes) via a crafted TIFF image, a different vulnerability than CVE-2015-8781.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8782", url: "https://www.suse.com/security/cve/CVE-2015-8782", }, { category: "external", summary: "SUSE Bug 964213 for CVE-2015-8782", url: "https://bugzilla.suse.com/964213", }, { category: "external", summary: "SUSE Bug 964225 for CVE-2015-8782", url: "https://bugzilla.suse.com/964225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2015-8782", }, { cve: "CVE-2015-8783", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8783", }, ], notes: [ { category: "general", text: "tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds reads) via a crafted TIFF image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8783", url: "https://www.suse.com/security/cve/CVE-2015-8783", }, { category: "external", summary: "SUSE Bug 964213 for CVE-2015-8783", url: "https://bugzilla.suse.com/964213", }, { category: "external", summary: "SUSE Bug 964225 for CVE-2015-8783", url: "https://bugzilla.suse.com/964225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2015-8783", }, { cve: "CVE-2016-3186", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3186", }, ], notes: [ { category: "general", text: "Buffer overflow in the readextension function in gif2tiff.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (application crash) via a crafted GIF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3186", url: "https://www.suse.com/security/cve/CVE-2016-3186", }, { category: "external", summary: "SUSE Bug 973340 for CVE-2016-3186", url: "https://bugzilla.suse.com/973340", }, { category: "external", summary: "SUSE Bug 983268 for CVE-2016-3186", url: "https://bugzilla.suse.com/983268", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-3186", }, { cve: "CVE-2016-3622", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3622", }, ], notes: [ { category: "general", text: "The fpAcc function in tif_predict.c in the tiff2rgba tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted TIFF image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3622", url: "https://www.suse.com/security/cve/CVE-2016-3622", }, { category: "external", summary: "SUSE Bug 974449 for CVE-2016-3622", url: "https://bugzilla.suse.com/974449", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2016-3622", }, { cve: "CVE-2016-3623", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3623", }, ], notes: [ { category: "general", text: "The rgb2ycbcr tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero) by setting the (1) v or (2) h parameter to 0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3623", url: "https://www.suse.com/security/cve/CVE-2016-3623", }, { category: "external", summary: "SUSE Bug 974617 for CVE-2016-3623", url: "https://bugzilla.suse.com/974617", }, { category: "external", summary: "SUSE Bug 974618 for CVE-2016-3623", url: "https://bugzilla.suse.com/974618", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2016-3623", }, { cve: "CVE-2016-3658", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3658", }, ], notes: [ { category: "general", text: "The TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via vectors involving the ma variable.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3658", url: "https://www.suse.com/security/cve/CVE-2016-3658", }, { category: "external", summary: "SUSE Bug 974840 for CVE-2016-3658", url: "https://bugzilla.suse.com/974840", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2016-3658", }, { cve: "CVE-2016-3945", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3945", }, ], notes: [ { category: "general", text: "Multiple integer overflows in the (1) cvt_by_strip and (2) cvt_by_tile functions in the tiff2rgba tool in LibTIFF 4.0.6 and earlier, when -b mode is enabled, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image, which triggers an out-of-bounds write.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3945", url: "https://www.suse.com/security/cve/CVE-2016-3945", }, { category: "external", summary: "SUSE Bug 974614 for CVE-2016-3945", url: "https://bugzilla.suse.com/974614", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2016-3945", }, { cve: "CVE-2016-3990", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3990", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the horizontalDifference8 function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image to tiffcp.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3990", url: "https://www.suse.com/security/cve/CVE-2016-3990", }, { category: "external", summary: "SUSE Bug 975069 for CVE-2016-3990", url: "https://bugzilla.suse.com/975069", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2016-3990", }, { cve: "CVE-2016-3991", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3991", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the loadImage function in the tiffcrop tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted TIFF image with zero tiles.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3991", url: "https://www.suse.com/security/cve/CVE-2016-3991", }, { category: "external", summary: "SUSE Bug 975070 for CVE-2016-3991", url: "https://bugzilla.suse.com/975070", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2016-3991", }, { cve: "CVE-2016-5314", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5314", }, ], notes: [ { category: "general", text: "Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5314", url: "https://www.suse.com/security/cve/CVE-2016-5314", }, { category: "external", summary: "SUSE Bug 984831 for CVE-2016-5314", url: "https://bugzilla.suse.com/984831", }, { category: "external", summary: "SUSE Bug 987351 for CVE-2016-5314", url: "https://bugzilla.suse.com/987351", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-5314", }, { cve: "CVE-2016-5316", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5316", }, ], notes: [ { category: "general", text: "Out-of-bounds read in the PixarLogCleanup function in tif_pixarlog.c in libtiff 4.0.6 and earlier allows remote attackers to crash the application by sending a crafted TIFF image to the rgb2ycbcr tool.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5316", url: "https://www.suse.com/security/cve/CVE-2016-5316", }, { category: "external", summary: "SUSE Bug 984837 for CVE-2016-5316", url: "https://bugzilla.suse.com/984837", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-5316", }, { cve: "CVE-2016-5317", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5317", }, ], notes: [ { category: "general", text: "Buffer overflow in the PixarLogDecode function in libtiff.so in the PixarLogDecode function in libtiff 4.0.6 and earlier, as used in GNOME nautilus, allows attackers to cause a denial of service attack (crash) via a crafted TIFF file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5317", url: "https://www.suse.com/security/cve/CVE-2016-5317", }, { category: "external", summary: "SUSE Bug 984842 for CVE-2016-5317", url: "https://bugzilla.suse.com/984842", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-5317", }, { cve: "CVE-2016-5320", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5320", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-5314. Reason: This candidate is a reservation duplicate of CVE-2016-5314. Notes: All CVE users should reference CVE-2016-5314 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5320", url: "https://www.suse.com/security/cve/CVE-2016-5320", }, { category: "external", summary: "SUSE Bug 1007284 for CVE-2016-5320", url: "https://bugzilla.suse.com/1007284", }, { category: "external", summary: "SUSE Bug 984808 for CVE-2016-5320", url: "https://bugzilla.suse.com/984808", }, { category: "external", summary: "SUSE Bug 987351 for CVE-2016-5320", url: "https://bugzilla.suse.com/987351", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-5320", }, { cve: "CVE-2016-5321", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5321", }, ], notes: [ { category: "general", text: "The DumpModeDecode function in libtiff 4.0.6 and earlier allows attackers to cause a denial of service (invalid read and crash) via a crafted tiff image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5321", url: "https://www.suse.com/security/cve/CVE-2016-5321", }, { category: "external", summary: "SUSE Bug 984813 for CVE-2016-5321", url: "https://bugzilla.suse.com/984813", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-5321", }, { cve: "CVE-2016-5323", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5323", }, ], notes: [ { category: "general", text: "The _TIFFFax3fillruns function in libtiff before 4.0.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted Tiff image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5323", url: "https://www.suse.com/security/cve/CVE-2016-5323", }, { category: "external", summary: "SUSE Bug 984815 for CVE-2016-5323", url: "https://bugzilla.suse.com/984815", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-5323", }, { cve: "CVE-2016-5652", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5652", }, ], notes: [ { category: "general", text: "An exploitable heap-based buffer overflow exists in the handling of TIFF images in LibTIFF's TIFF2PDF tool. A crafted TIFF document can lead to a heap-based buffer overflow resulting in remote code execution. Vulnerability can be triggered via a saved TIFF file delivered by other means.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5652", url: "https://www.suse.com/security/cve/CVE-2016-5652", }, { category: "external", summary: "SUSE Bug 1007280 for CVE-2016-5652", url: "https://bugzilla.suse.com/1007280", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-5652", }, { cve: "CVE-2016-5875", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5875", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-5314. Reason: This candidate is a reservation duplicate of CVE-2016-5314. Notes: All CVE users should reference CVE-2016-5314 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5875", url: "https://www.suse.com/security/cve/CVE-2016-5875", }, { category: "external", summary: "SUSE Bug 1007284 for CVE-2016-5875", url: "https://bugzilla.suse.com/1007284", }, { category: "external", summary: "SUSE Bug 984809 for CVE-2016-5875", url: "https://bugzilla.suse.com/984809", }, { category: "external", summary: "SUSE Bug 984831 for CVE-2016-5875", url: "https://bugzilla.suse.com/984831", }, { category: "external", summary: "SUSE Bug 987351 for CVE-2016-5875", url: "https://bugzilla.suse.com/987351", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-5875", }, { cve: "CVE-2016-9273", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9273", }, ], notes: [ { category: "general", text: "tiffsplit in libtiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file, related to changing td_nstrips in TIFF_STRIPCHOP mode.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9273", url: "https://www.suse.com/security/cve/CVE-2016-9273", }, { category: "external", summary: "SUSE Bug 1010163 for CVE-2016-9273", url: "https://bugzilla.suse.com/1010163", }, { category: "external", summary: "SUSE Bug 1017693 for CVE-2016-9273", url: "https://bugzilla.suse.com/1017693", }, { category: "external", summary: "SUSE Bug 1150480 for CVE-2016-9273", url: "https://bugzilla.suse.com/1150480", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-9273", }, { cve: "CVE-2016-9297", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9297", }, ], notes: [ { category: "general", text: "The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via crafted TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII tag values.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9297", url: "https://www.suse.com/security/cve/CVE-2016-9297", }, { category: "external", summary: "SUSE Bug 1010161 for CVE-2016-9297", url: "https://bugzilla.suse.com/1010161", }, { category: "external", summary: "SUSE Bug 1011103 for CVE-2016-9297", url: "https://bugzilla.suse.com/1011103", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-9297", }, { cve: "CVE-2016-9448", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9448", }, ], notes: [ { category: "general", text: "The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by setting the tags TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII to values that access 0-byte arrays. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9297.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9448", url: "https://www.suse.com/security/cve/CVE-2016-9448", }, { category: "external", summary: "SUSE Bug 1010161 for CVE-2016-9448", url: "https://bugzilla.suse.com/1010161", }, { category: "external", summary: "SUSE Bug 1011103 for CVE-2016-9448", url: "https://bugzilla.suse.com/1011103", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-9448", }, { cve: "CVE-2016-9453", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9453", }, ], notes: [ { category: "general", text: "The t2p_readwrite_pdf_image_tile function in LibTIFF allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a JPEG file with a TIFFTAG_JPEGTABLES of length one.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9453", url: "https://www.suse.com/security/cve/CVE-2016-9453", }, { category: "external", summary: "SUSE Bug 1007280 for CVE-2016-9453", url: "https://bugzilla.suse.com/1007280", }, { category: "external", summary: "SUSE Bug 1011107 for CVE-2016-9453", url: "https://bugzilla.suse.com/1011107", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.s390x", "openSUSE Tumbleweed:libtiff5-4.0.7-1.1.x86_64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.aarch64", "openSUSE Tumbleweed:tiff-4.0.7-1.1.ppc64le", "openSUSE Tumbleweed:tiff-4.0.7-1.1.s390x", "openSUSE Tumbleweed:tiff-4.0.7-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2016-9453", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.