Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-2908 (GCVE-0-2023-2908)
Vulnerability from cvelistv5
Published
2023-06-30 00:00
Modified
2024-10-28 13:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-476 - NULL Pointer Dereference
Summary
A null pointer dereference issue was found in Libtiff's tif_dir.c file. This issue may allow an attacker to pass a crafted TIFF image file to the tiffcp utility which triggers a runtime error that causes undefined behavior. This will result in an application crash, eventually leading to a denial of service.
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| n/a | Libtiff | |||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T06:41:03.535Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://access.redhat.com/security/cve/CVE-2023-2908"
},
{
"tags": [
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218830"
},
{
"tags": [
"x_transferred"
],
"url": "https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f"
},
{
"tags": [
"x_transferred"
],
"url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/479"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20230731-0004/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-2908",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-28T13:04:03.459315Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-28T13:04:20.389Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Libtiff",
"vendor": "n/a",
"versions": [
{
"status": "unaffected",
"version": "4.5.1rc1"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:6"
],
"defaultStatus": "unaffected",
"packageName": "libtiff",
"product": "Red Hat Enterprise Linux 6",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:7"
],
"defaultStatus": "unaffected",
"packageName": "compat-libtiff3",
"product": "Red Hat Enterprise Linux 7",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:7"
],
"defaultStatus": "unaffected",
"packageName": "libtiff",
"product": "Red Hat Enterprise Linux 7",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8"
],
"defaultStatus": "unaffected",
"packageName": "compat-libtiff3",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8"
],
"defaultStatus": "unaffected",
"packageName": "libtiff",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9"
],
"defaultStatus": "unaffected",
"packageName": "libtiff",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat"
},
{
"collectionURL": "https://packages.fedoraproject.org/",
"defaultStatus": "affected",
"packageName": "tkimg",
"product": "Fedora",
"vendor": "Fedora"
},
{
"collectionURL": "https://packages.fedoraproject.org/",
"defaultStatus": "affected",
"packageName": "iv",
"product": "Fedora",
"vendor": "Fedora"
},
{
"collectionURL": "https://packages.fedoraproject.org/",
"defaultStatus": "affected",
"packageName": "libtiff",
"product": "Fedora",
"vendor": "Fedora"
},
{
"collectionURL": "https://packages.fedoraproject.org/",
"defaultStatus": "affected",
"packageName": "mingw-libtiff",
"product": "Fedora",
"vendor": "Fedora"
}
],
"datePublic": "2023-06-30T00:00:00+00:00",
"descriptions": [
{
"lang": "en",
"value": "A null pointer dereference issue was found in Libtiff\u0027s tif_dir.c file. This issue may allow an attacker to pass a crafted TIFF image file to the tiffcp utility which triggers a runtime error that causes undefined behavior. This will result in an application crash, eventually leading to a denial of service."
}
],
"metrics": [
{
"other": {
"content": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"value": "Low"
},
"type": "Red Hat severity rating"
}
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-476",
"description": "NULL Pointer Dereference",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-01-23T01:44:14.895Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2023-2908"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218830"
},
{
"url": "https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f"
},
{
"url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/479"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230731-0004/"
}
],
"timeline": [
{
"lang": "en",
"time": "2023-05-26T00:00:00+00:00",
"value": "Reported to Red Hat."
},
{
"lang": "en",
"time": "2023-06-30T00:00:00+00:00",
"value": "Made public."
}
],
"title": "Libtiff: null pointer dereference in tif_dir.c",
"x_redhatCweChain": "CWE-476: NULL Pointer Dereference"
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2023-2908",
"datePublished": "2023-06-30T00:00:00",
"dateReserved": "2023-05-26T00:00:00",
"dateUpdated": "2024-10-28T13:04:20.389Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2023-2908\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2023-06-30T22:15:10.017\",\"lastModified\":\"2024-11-21T07:59:32.713\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A null pointer dereference issue was found in Libtiff\u0027s tif_dir.c file. This issue may allow an attacker to pass a crafted TIFF image file to the tiffcp utility which triggers a runtime error that causes undefined behavior. This will result in an application crash, eventually leading to a denial of service.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.5.0\",\"matchCriteriaId\":\"A17B02C6-10A4-4AAF-9D59-BEA968264451\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/security/cve/CVE-2023-2908\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2218830\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://gitlab.com/libtiff/libtiff/-/merge_requests/479\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20230731-0004/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/CVE-2023-2908\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2218830\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://gitlab.com/libtiff/libtiff/-/merge_requests/479\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20230731-0004/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://access.redhat.com/security/cve/CVE-2023-2908\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2218830\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://gitlab.com/libtiff/libtiff/-/merge_requests/479\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20230731-0004/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T06:41:03.535Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-2908\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-28T13:04:03.459315Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-28T13:04:12.786Z\"}}], \"cna\": {\"title\": \"Libtiff: null pointer dereference in tif_dir.c\", \"metrics\": [{\"other\": {\"type\": \"Red Hat severity rating\", \"content\": {\"value\": \"Low\", \"namespace\": \"https://access.redhat.com/security/updates/classification/\"}}}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"n/a\", \"product\": \"Libtiff\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"4.5.1rc1\"}]}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:6\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 6\", \"packageName\": \"libtiff\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:7\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 7\", \"packageName\": \"compat-libtiff3\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:7\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 7\", \"packageName\": \"libtiff\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"packageName\": \"compat-libtiff3\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"packageName\": \"libtiff\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"packageName\": \"libtiff\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Fedora\", \"product\": \"Fedora\", \"packageName\": \"tkimg\", \"collectionURL\": \"https://packages.fedoraproject.org/\", \"defaultStatus\": \"affected\"}, {\"vendor\": \"Fedora\", \"product\": \"Fedora\", \"packageName\": \"iv\", \"collectionURL\": \"https://packages.fedoraproject.org/\", \"defaultStatus\": \"affected\"}, {\"vendor\": \"Fedora\", \"product\": \"Fedora\", \"packageName\": \"libtiff\", \"collectionURL\": \"https://packages.fedoraproject.org/\", \"defaultStatus\": \"affected\"}, {\"vendor\": \"Fedora\", \"product\": \"Fedora\", \"packageName\": \"mingw-libtiff\", \"collectionURL\": \"https://packages.fedoraproject.org/\", \"defaultStatus\": \"affected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2023-05-26T00:00:00+00:00\", \"value\": \"Reported to Red Hat.\"}, {\"lang\": \"en\", \"time\": \"2023-06-30T00:00:00+00:00\", \"value\": \"Made public.\"}], \"datePublic\": \"2023-06-30T00:00:00+00:00\", \"references\": [{\"url\": \"https://access.redhat.com/security/cve/CVE-2023-2908\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2218830\"}, {\"url\": \"https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f\"}, {\"url\": \"https://gitlab.com/libtiff/libtiff/-/merge_requests/479\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20230731-0004/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A null pointer dereference issue was found in Libtiff\u0027s tif_dir.c file. This issue may allow an attacker to pass a crafted TIFF image file to the tiffcp utility which triggers a runtime error that causes undefined behavior. This will result in an application crash, eventually leading to a denial of service.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-476\", \"description\": \"NULL Pointer Dereference\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2024-01-23T01:44:14.895Z\"}, \"x_redhatCweChain\": \"CWE-476: NULL Pointer Dereference\"}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-2908\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-28T13:04:20.389Z\", \"dateReserved\": \"2023-05-26T00:00:00\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2023-06-30T00:00:00\", \"assignerShortName\": \"redhat\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
msrc_cve-2023-2908
Vulnerability from csaf_microsoft
Published
2023-06-01 07:00
Modified
2023-07-03 00:00
Summary
Libtiff: null pointer dereference in tif_dir.c
Notes
Additional Resources
To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle
Disclaimer
The information provided in the Microsoft Knowledge Base is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2023-2908 Libtiff: null pointer dereference in tif_dir.c - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2023/msrc_cve-2023-2908.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Libtiff: null pointer dereference in tif_dir.c",
"tracking": {
"current_release_date": "2023-07-03T00:00:00.000Z",
"generator": {
"date": "2025-10-20T00:29:44.629Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2023-2908",
"initial_release_date": "2023-06-01T07:00:00.000Z",
"revision_history": [
{
"date": "2023-07-03T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "1.0",
"product": {
"name": "CBL Mariner 1.0",
"product_id": "16820"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccm1 libtiff 4.5.1-1",
"product": {
"name": "\u003ccm1 libtiff 4.5.1-1",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cm1 libtiff 4.5.1-1",
"product": {
"name": "cm1 libtiff 4.5.1-1",
"product_id": "17836"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 libtiff 4.5.1-1",
"product": {
"name": "\u003ccbl2 libtiff 4.5.1-1",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 libtiff 4.5.1-1",
"product": {
"name": "cbl2 libtiff 4.5.1-1",
"product_id": "17837"
}
}
],
"category": "product_name",
"name": "libtiff"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccm1 libtiff 4.5.1-1 as a component of CBL Mariner 1.0",
"product_id": "16820-2"
},
"product_reference": "2",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cm1 libtiff 4.5.1-1 as a component of CBL Mariner 1.0",
"product_id": "17836-16820"
},
"product_reference": "17836",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 libtiff 4.5.1-1 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 libtiff 4.5.1-1 as a component of CBL Mariner 2.0",
"product_id": "17837-17086"
},
"product_reference": "17837",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-2908",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "general",
"text": "redhat",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"17836-16820",
"17837-17086"
],
"known_affected": [
"16820-2",
"17086-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-2908 Libtiff: null pointer dereference in tif_dir.c - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2023/msrc_cve-2023-2908.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2023-07-03T00:00:00.000Z",
"details": "4.5.1-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"16820-2",
"17086-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"16820-2",
"17086-1"
]
}
],
"title": "Libtiff: null pointer dereference in tif_dir.c"
}
]
}
CERTFR-2024-AVI-1103
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | Cognos Analytics versions 12.0.x antérieures à 12.0.4 | ||
| IBM | Sterling | Sterling External Authentication Server versions 6.1.0.x antérieures à 6.1.0.2 ifix 01 | ||
| IBM | QRadar SIEM | Security QRadar Log Management AQL Plugin versions antérieures à 1.1.0 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.0.x antérieures à 6.0.3.1 (fixpack) GA | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 11.2.4 FP5 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.1.x antérieures à 6.1.0.1 (fixpack) GA | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.2.x antérieures à 6.2.0.0 ifix 01 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions 6.3.x antérieures à 6.3.0.11_ifix001 |
References
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cognos Analytics versions 12.0.x ant\u00e9rieures \u00e0 12.0.4",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling External Authentication Server versions 6.1.0.x ant\u00e9rieures \u00e0 6.1.0.2 ifix 01",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": " Security QRadar Log Management AQL Plugin versions ant\u00e9rieures \u00e0 1.1.0",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.0.x ant\u00e9rieures \u00e0 6.0.3.1 (fixpack) GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 FP5",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.1.x ant\u00e9rieures \u00e0 6.1.0.1 (fixpack) GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.0 ifix 01",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct Web Services versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.11_ifix001",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2010-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1205"
},
{
"name": "CVE-2014-1544",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1544"
},
{
"name": "CVE-2014-1568",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1568"
},
{
"name": "CVE-2015-7182",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7182"
},
{
"name": "CVE-2015-7181",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7181"
},
{
"name": "CVE-2015-7575",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7575"
},
{
"name": "CVE-2016-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1938"
},
{
"name": "CVE-2017-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5461"
},
{
"name": "CVE-2018-12384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12384"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2019-11729",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
},
{
"name": "CVE-2019-11727",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
},
{
"name": "CVE-2019-11719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
},
{
"name": "CVE-2018-12404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12404"
},
{
"name": "CVE-2019-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-8331",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8331"
},
{
"name": "CVE-2019-11358",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11358"
},
{
"name": "CVE-2019-17023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
},
{
"name": "CVE-2020-11022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2020-12400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
},
{
"name": "CVE-2020-12401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
},
{
"name": "CVE-2020-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
},
{
"name": "CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"name": "CVE-2018-18508",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18508"
},
{
"name": "CVE-2019-17007",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17007"
},
{
"name": "CVE-2018-20677",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20677"
},
{
"name": "CVE-2018-14040",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14040"
},
{
"name": "CVE-2018-14042",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14042"
},
{
"name": "CVE-2016-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10735"
},
{
"name": "CVE-2018-20676",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20676"
},
{
"name": "CVE-2017-12652",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12652"
},
{
"name": "CVE-2020-25648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25648"
},
{
"name": "CVE-2022-23990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23990"
},
{
"name": "CVE-2021-45960",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
},
{
"name": "CVE-2022-22827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
},
{
"name": "CVE-2022-22825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
},
{
"name": "CVE-2022-22824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
},
{
"name": "CVE-2022-22826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
},
{
"name": "CVE-2022-23852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
},
{
"name": "CVE-2022-22823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
},
{
"name": "CVE-2020-12403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
},
{
"name": "CVE-2021-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38153"
},
{
"name": "CVE-2021-43138",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43138"
},
{
"name": "CVE-2022-34749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34749"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-31130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31130"
},
{
"name": "CVE-2023-32067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
},
{
"name": "CVE-2023-25194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25194"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2023-38325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2020-19189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19189"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2022-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21699"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2020-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-23064"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2024-29133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29133"
},
{
"name": "CVE-2024-29131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29131"
},
{
"name": "CVE-2024-28849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28849"
},
{
"name": "CVE-2024-22201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22201"
},
{
"name": "CVE-2024-25629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-4367",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4367"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2024-23944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23944"
},
{
"name": "CVE-2023-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38264"
},
{
"name": "CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"name": "CVE-2024-34102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34102"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2024-29041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29041"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-28176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28176"
},
{
"name": "CVE-2024-28863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28863"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2024-4068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4068"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2023-52356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52356"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37890"
},
{
"name": "CVE-2024-39008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39008"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2024-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
},
{
"name": "CVE-2024-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22020"
},
{
"name": "CVE-2024-27980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27980"
},
{
"name": "CVE-2024-36137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36137"
},
{
"name": "CVE-2024-36138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36138"
},
{
"name": "CVE-2024-37372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37372"
},
{
"name": "CVE-2024-39338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22871"
},
{
"name": "CVE-2018-15209",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15209"
},
{
"name": "CVE-2023-37536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37536"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-43796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43796"
},
{
"name": "CVE-2024-45590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
},
{
"name": "CVE-2018-14041",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14041"
},
{
"name": "CVE-2024-36114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36114"
},
{
"name": "CVE-2024-25638",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25638"
},
{
"name": "CVE-2024-51504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51504"
},
{
"name": "CVE-2024-7006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7006"
},
{
"name": "CVE-2013-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2099"
},
{
"name": "CVE-2014-1569",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1569"
},
{
"name": "CVE-2017-11613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11613"
},
{
"name": "CVE-2017-11695",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11695"
},
{
"name": "CVE-2017-11696",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11696"
},
{
"name": "CVE-2017-11697",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11697"
},
{
"name": "CVE-2017-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11698"
},
{
"name": "CVE-2017-12627",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12627"
},
{
"name": "CVE-2017-18013",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18013"
},
{
"name": "CVE-2017-18869",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18869"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2018-16335",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16335"
},
{
"name": "CVE-2018-17000",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17000"
},
{
"name": "CVE-2018-17100",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17100"
},
{
"name": "CVE-2018-17101",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17101"
},
{
"name": "CVE-2018-19210",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19210"
},
{
"name": "CVE-2018-5784",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5784"
},
{
"name": "CVE-2018-7456",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7456"
},
{
"name": "CVE-2019-10255",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10255"
},
{
"name": "CVE-2019-14973",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14973"
},
{
"name": "CVE-2019-17546",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17546"
},
{
"name": "CVE-2019-6128",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6128"
},
{
"name": "CVE-2020-15110",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15110"
},
{
"name": "CVE-2020-18768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18768"
},
{
"name": "CVE-2020-19131",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19131"
},
{
"name": "CVE-2020-19144",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19144"
},
{
"name": "CVE-2020-26261",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26261"
},
{
"name": "CVE-2020-35521",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35521"
},
{
"name": "CVE-2020-35522",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35522"
},
{
"name": "CVE-2020-35523",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35523"
},
{
"name": "CVE-2020-35524",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35524"
},
{
"name": "CVE-2020-36191",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36191"
},
{
"name": "CVE-2021-32862",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32862"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-0891",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0891"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2022-34266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34266"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2022-3479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3479"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2023-24816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24816"
},
{
"name": "CVE-2023-25434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25434"
},
{
"name": "CVE-2023-25435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25435"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2023-30775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30775"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2023-38288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38288"
},
{
"name": "CVE-2023-38289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38289"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2023-41334",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41334"
},
{
"name": "CVE-2023-4421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4421"
},
{
"name": "CVE-2023-4759",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4759"
},
{
"name": "CVE-2023-50291",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50291"
},
{
"name": "CVE-2023-50292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50292"
},
{
"name": "CVE-2023-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50298"
},
{
"name": "CVE-2023-50386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50386"
},
{
"name": "CVE-2023-50447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50447"
},
{
"name": "CVE-2024-25016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25016"
},
{
"name": "CVE-2024-29896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29896"
},
{
"name": "CVE-2024-33883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33883"
},
{
"name": "CVE-2024-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38337"
},
{
"name": "CVE-2024-41752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41752"
},
{
"name": "CVE-2024-45082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45082"
}
],
"initial_release_date": "2024-12-20T00:00:00",
"last_revision_date": "2024-12-20T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-1103",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-12-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-12-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7177142",
"url": "https://www.ibm.com/support/pages/node/7177142"
},
{
"published_at": "2024-12-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7177223",
"url": "https://www.ibm.com/support/pages/node/7177223"
},
{
"published_at": "2024-12-16",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7179044",
"url": "https://www.ibm.com/support/pages/node/7179044"
},
{
"published_at": "2024-12-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7179156",
"url": "https://www.ibm.com/support/pages/node/7179156"
},
{
"published_at": "2024-12-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7179166",
"url": "https://www.ibm.com/support/pages/node/7179166"
},
{
"published_at": "2024-12-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7178835",
"url": "https://www.ibm.com/support/pages/node/7178835"
}
]
}
WID-SEC-W-2023-1605
Vulnerability from csaf_certbund
Published
2023-06-29 22:00
Modified
2025-01-20 23:00
Summary
libTIFF: Schwachstelle ermöglicht Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
libTIFF ist ein Softwarepaket für die Verarbeitung von Bilddateien in Tag Image File Format (TIFF).
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in libTIFF ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
- Sonstiges
- UNIX
- Windows
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "libTIFF ist ein Softwarepaket f\u00fcr die Verarbeitung von Bilddateien in Tag Image File Format (TIFF).",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in libTIFF ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1605 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1605.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1605 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1605"
},
{
"category": "external",
"summary": "RedHat Bugzilla vom 2023-06-29",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218830"
},
{
"category": "external",
"summary": "PoC auf gitlab",
"url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/479"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3513 vom 2023-08-01",
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6290-1 vom 2023-08-16",
"url": "https://ubuntu.com/security/notices/USN-6290-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4026 vom 2025-01-20",
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00019.html"
}
],
"source_lang": "en-US",
"title": "libTIFF: Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2025-01-20T23:00:00.000+00:00",
"generator": {
"date": "2025-01-21T09:16:04.094+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.10"
}
},
"id": "WID-SEC-W-2023-1605",
"initial_release_date": "2023-06-29T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-06-29T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-07-31T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2023-08-15T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-20T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Debian aufgenommen"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c4.5.1rc1",
"product": {
"name": "Open Source libTIFF \u003c4.5.1rc1",
"product_id": "T028372"
}
},
{
"category": "product_version",
"name": "4.5.1rc1",
"product": {
"name": "Open Source libTIFF 4.5.1rc1",
"product_id": "T028372-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:libtiff:libtiff:4.5.1rc1"
}
}
}
],
"category": "product_name",
"name": "libTIFF"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-2908",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in libTIFF. In der Datei tif_dir.c von Libtiff besteht ein Nullzeiger-Dereferenzierungsproblem. Bei der Verarbeitung einer manipulierten TIFF-Bilddatei im Dienstprogramm tiffcp kommt es zu einem Laufzeitfehler, der ein undefiniertes Verhalten verursacht, was zu einem Absturz der Anwendung f\u00fchrt. Ein Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T028372",
"2951",
"T000126"
]
},
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2023-2908"
}
]
}
wid-sec-w-2023-1605
Vulnerability from csaf_certbund
Published
2023-06-29 22:00
Modified
2025-01-20 23:00
Summary
libTIFF: Schwachstelle ermöglicht Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
libTIFF ist ein Softwarepaket für die Verarbeitung von Bilddateien in Tag Image File Format (TIFF).
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in libTIFF ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
- Sonstiges
- UNIX
- Windows
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "libTIFF ist ein Softwarepaket f\u00fcr die Verarbeitung von Bilddateien in Tag Image File Format (TIFF).",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in libTIFF ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1605 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1605.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1605 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1605"
},
{
"category": "external",
"summary": "RedHat Bugzilla vom 2023-06-29",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218830"
},
{
"category": "external",
"summary": "PoC auf gitlab",
"url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/479"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3513 vom 2023-08-01",
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6290-1 vom 2023-08-16",
"url": "https://ubuntu.com/security/notices/USN-6290-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4026 vom 2025-01-20",
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00019.html"
}
],
"source_lang": "en-US",
"title": "libTIFF: Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2025-01-20T23:00:00.000+00:00",
"generator": {
"date": "2025-01-21T09:16:04.094+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.10"
}
},
"id": "WID-SEC-W-2023-1605",
"initial_release_date": "2023-06-29T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-06-29T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-07-31T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2023-08-15T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-20T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Debian aufgenommen"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c4.5.1rc1",
"product": {
"name": "Open Source libTIFF \u003c4.5.1rc1",
"product_id": "T028372"
}
},
{
"category": "product_version",
"name": "4.5.1rc1",
"product": {
"name": "Open Source libTIFF 4.5.1rc1",
"product_id": "T028372-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:libtiff:libtiff:4.5.1rc1"
}
}
}
],
"category": "product_name",
"name": "libTIFF"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-2908",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in libTIFF. In der Datei tif_dir.c von Libtiff besteht ein Nullzeiger-Dereferenzierungsproblem. Bei der Verarbeitung einer manipulierten TIFF-Bilddatei im Dienstprogramm tiffcp kommt es zu einem Laufzeitfehler, der ein undefiniertes Verhalten verursacht, was zu einem Absturz der Anwendung f\u00fchrt. Ein Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T028372",
"2951",
"T000126"
]
},
"release_date": "2023-06-29T22:00:00.000+00:00",
"title": "CVE-2023-2908"
}
]
}
suse-su-2023:4371-1
Vulnerability from csaf_suse
Published
2023-11-06 08:52
Modified
2023-11-06 08:52
Summary
Security update for tiff
Notes
Title of the patch
Security update for tiff
Description of the patch
This update for tiff fixes the following issues:
- CVE-2023-38289: Fixed a NULL pointer dereference in raw2tiff
(bsc#1213589).
- CVE-2023-38288: Fixed an integer overflow in raw2tiff (bsc#1213590).
- CVE-2023-3576: Fixed a memory leak in tiffcrop (bsc#1213273).
- CVE-2020-18768: Fixed an out of bounds read in tiffcp (bsc#1214574).
- CVE-2023-26966: Fixed an out of bounds read when transforming a
little-endian file to a big-endian output (bsc#1212881)
- CVE-2023-3618: Fixed a NULL pointer dereference while encoding FAX3
files (bsc#1213274).
- CVE-2023-2908: Fixed an undefined behavior issue when doing pointer
arithmetic on a NULL pointer (bsc#1212888).
- CVE-2023-3316: Fixed a NULL pointer dereference while opening a file
in an inaccessible path (bsc#1212535).
- CVE-2023-25433: Fixed a buffer overflow in tiffcrop (bsc#1212883).
Patchnames
SUSE-2023-4371,SUSE-SLE-SDK-12-SP5-2023-4371,SUSE-SLE-SERVER-12-SP5-2023-4371
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for tiff",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for tiff fixes the following issues:\n\n- CVE-2023-38289: Fixed a NULL pointer dereference in raw2tiff\n (bsc#1213589).\n- CVE-2023-38288: Fixed an integer overflow in raw2tiff (bsc#1213590).\n- CVE-2023-3576: Fixed a memory leak in tiffcrop (bsc#1213273).\n- CVE-2020-18768: Fixed an out of bounds read in tiffcp (bsc#1214574).\n- CVE-2023-26966: Fixed an out of bounds read when transforming a\n little-endian file to a big-endian output (bsc#1212881)\n- CVE-2023-3618: Fixed a NULL pointer dereference while encoding FAX3\n files (bsc#1213274).\n- CVE-2023-2908: Fixed an undefined behavior issue when doing pointer\n arithmetic on a NULL pointer (bsc#1212888).\n- CVE-2023-3316: Fixed a NULL pointer dereference while opening a file\n in an inaccessible path (bsc#1212535).\n- CVE-2023-25433: Fixed a buffer overflow in tiffcrop (bsc#1212883).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-4371,SUSE-SLE-SDK-12-SP5-2023-4371,SUSE-SLE-SERVER-12-SP5-2023-4371",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4371-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:4371-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20234371-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:4371-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-November/016999.html"
},
{
"category": "self",
"summary": "SUSE Bug 1212535",
"url": "https://bugzilla.suse.com/1212535"
},
{
"category": "self",
"summary": "SUSE Bug 1212881",
"url": "https://bugzilla.suse.com/1212881"
},
{
"category": "self",
"summary": "SUSE Bug 1212883",
"url": "https://bugzilla.suse.com/1212883"
},
{
"category": "self",
"summary": "SUSE Bug 1212888",
"url": "https://bugzilla.suse.com/1212888"
},
{
"category": "self",
"summary": "SUSE Bug 1213273",
"url": "https://bugzilla.suse.com/1213273"
},
{
"category": "self",
"summary": "SUSE Bug 1213274",
"url": "https://bugzilla.suse.com/1213274"
},
{
"category": "self",
"summary": "SUSE Bug 1213589",
"url": "https://bugzilla.suse.com/1213589"
},
{
"category": "self",
"summary": "SUSE Bug 1213590",
"url": "https://bugzilla.suse.com/1213590"
},
{
"category": "self",
"summary": "SUSE Bug 1214574",
"url": "https://bugzilla.suse.com/1214574"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-18768 page",
"url": "https://www.suse.com/security/cve/CVE-2020-18768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-25433 page",
"url": "https://www.suse.com/security/cve/CVE-2023-25433/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-26966 page",
"url": "https://www.suse.com/security/cve/CVE-2023-26966/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2908 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2908/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3316 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3316/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3576 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3576/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3618 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3618/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-38288 page",
"url": "https://www.suse.com/security/cve/CVE-2023-38288/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-38289 page",
"url": "https://www.suse.com/security/cve/CVE-2023-38289/"
}
],
"title": "Security update for tiff",
"tracking": {
"current_release_date": "2023-11-06T08:52:20Z",
"generator": {
"date": "2023-11-06T08:52:20Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:4371-1",
"initial_release_date": "2023-11-06T08:52:20Z",
"revision_history": [
{
"date": "2023-11-06T08:52:20Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-4.0.9-44.71.1.aarch64",
"product": {
"name": "libtiff-devel-4.0.9-44.71.1.aarch64",
"product_id": "libtiff-devel-4.0.9-44.71.1.aarch64"
}
},
{
"category": "product_version",
"name": "libtiff5-4.0.9-44.71.1.aarch64",
"product": {
"name": "libtiff5-4.0.9-44.71.1.aarch64",
"product_id": "libtiff5-4.0.9-44.71.1.aarch64"
}
},
{
"category": "product_version",
"name": "tiff-4.0.9-44.71.1.aarch64",
"product": {
"name": "tiff-4.0.9-44.71.1.aarch64",
"product_id": "tiff-4.0.9-44.71.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-64bit-4.0.9-44.71.1.aarch64_ilp32",
"product": {
"name": "libtiff-devel-64bit-4.0.9-44.71.1.aarch64_ilp32",
"product_id": "libtiff-devel-64bit-4.0.9-44.71.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libtiff5-64bit-4.0.9-44.71.1.aarch64_ilp32",
"product": {
"name": "libtiff5-64bit-4.0.9-44.71.1.aarch64_ilp32",
"product_id": "libtiff5-64bit-4.0.9-44.71.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-4.0.9-44.71.1.i586",
"product": {
"name": "libtiff-devel-4.0.9-44.71.1.i586",
"product_id": "libtiff-devel-4.0.9-44.71.1.i586"
}
},
{
"category": "product_version",
"name": "libtiff5-4.0.9-44.71.1.i586",
"product": {
"name": "libtiff5-4.0.9-44.71.1.i586",
"product_id": "libtiff5-4.0.9-44.71.1.i586"
}
},
{
"category": "product_version",
"name": "tiff-4.0.9-44.71.1.i586",
"product": {
"name": "tiff-4.0.9-44.71.1.i586",
"product_id": "tiff-4.0.9-44.71.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-4.0.9-44.71.1.ppc64le",
"product": {
"name": "libtiff-devel-4.0.9-44.71.1.ppc64le",
"product_id": "libtiff-devel-4.0.9-44.71.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libtiff5-4.0.9-44.71.1.ppc64le",
"product": {
"name": "libtiff5-4.0.9-44.71.1.ppc64le",
"product_id": "libtiff5-4.0.9-44.71.1.ppc64le"
}
},
{
"category": "product_version",
"name": "tiff-4.0.9-44.71.1.ppc64le",
"product": {
"name": "tiff-4.0.9-44.71.1.ppc64le",
"product_id": "tiff-4.0.9-44.71.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-4.0.9-44.71.1.s390",
"product": {
"name": "libtiff-devel-4.0.9-44.71.1.s390",
"product_id": "libtiff-devel-4.0.9-44.71.1.s390"
}
},
{
"category": "product_version",
"name": "libtiff5-4.0.9-44.71.1.s390",
"product": {
"name": "libtiff5-4.0.9-44.71.1.s390",
"product_id": "libtiff5-4.0.9-44.71.1.s390"
}
},
{
"category": "product_version",
"name": "tiff-4.0.9-44.71.1.s390",
"product": {
"name": "tiff-4.0.9-44.71.1.s390",
"product_id": "tiff-4.0.9-44.71.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-4.0.9-44.71.1.s390x",
"product": {
"name": "libtiff-devel-4.0.9-44.71.1.s390x",
"product_id": "libtiff-devel-4.0.9-44.71.1.s390x"
}
},
{
"category": "product_version",
"name": "libtiff-devel-32bit-4.0.9-44.71.1.s390x",
"product": {
"name": "libtiff-devel-32bit-4.0.9-44.71.1.s390x",
"product_id": "libtiff-devel-32bit-4.0.9-44.71.1.s390x"
}
},
{
"category": "product_version",
"name": "libtiff5-4.0.9-44.71.1.s390x",
"product": {
"name": "libtiff5-4.0.9-44.71.1.s390x",
"product_id": "libtiff5-4.0.9-44.71.1.s390x"
}
},
{
"category": "product_version",
"name": "libtiff5-32bit-4.0.9-44.71.1.s390x",
"product": {
"name": "libtiff5-32bit-4.0.9-44.71.1.s390x",
"product_id": "libtiff5-32bit-4.0.9-44.71.1.s390x"
}
},
{
"category": "product_version",
"name": "tiff-4.0.9-44.71.1.s390x",
"product": {
"name": "tiff-4.0.9-44.71.1.s390x",
"product_id": "tiff-4.0.9-44.71.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-4.0.9-44.71.1.x86_64",
"product": {
"name": "libtiff-devel-4.0.9-44.71.1.x86_64",
"product_id": "libtiff-devel-4.0.9-44.71.1.x86_64"
}
},
{
"category": "product_version",
"name": "libtiff-devel-32bit-4.0.9-44.71.1.x86_64",
"product": {
"name": "libtiff-devel-32bit-4.0.9-44.71.1.x86_64",
"product_id": "libtiff-devel-32bit-4.0.9-44.71.1.x86_64"
}
},
{
"category": "product_version",
"name": "libtiff5-4.0.9-44.71.1.x86_64",
"product": {
"name": "libtiff5-4.0.9-44.71.1.x86_64",
"product_id": "libtiff5-4.0.9-44.71.1.x86_64"
}
},
{
"category": "product_version",
"name": "libtiff5-32bit-4.0.9-44.71.1.x86_64",
"product": {
"name": "libtiff5-32bit-4.0.9-44.71.1.x86_64",
"product_id": "libtiff5-32bit-4.0.9-44.71.1.x86_64"
}
},
{
"category": "product_version",
"name": "tiff-4.0.9-44.71.1.x86_64",
"product": {
"name": "tiff-4.0.9-44.71.1.x86_64",
"product_id": "tiff-4.0.9-44.71.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-44.71.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64"
},
"product_reference": "libtiff-devel-4.0.9-44.71.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-44.71.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le"
},
"product_reference": "libtiff-devel-4.0.9-44.71.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-44.71.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x"
},
"product_reference": "libtiff-devel-4.0.9-44.71.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-44.71.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
},
"product_reference": "libtiff-devel-4.0.9-44.71.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-44.71.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64"
},
"product_reference": "libtiff5-4.0.9-44.71.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-44.71.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le"
},
"product_reference": "libtiff5-4.0.9-44.71.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-44.71.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x"
},
"product_reference": "libtiff5-4.0.9-44.71.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-44.71.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64"
},
"product_reference": "libtiff5-4.0.9-44.71.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-32bit-4.0.9-44.71.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x"
},
"product_reference": "libtiff5-32bit-4.0.9-44.71.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-32bit-4.0.9-44.71.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64"
},
"product_reference": "libtiff5-32bit-4.0.9-44.71.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-44.71.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64"
},
"product_reference": "tiff-4.0.9-44.71.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-44.71.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le"
},
"product_reference": "tiff-4.0.9-44.71.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-44.71.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x"
},
"product_reference": "tiff-4.0.9-44.71.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-44.71.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64"
},
"product_reference": "tiff-4.0.9-44.71.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-44.71.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64"
},
"product_reference": "libtiff5-4.0.9-44.71.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-44.71.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le"
},
"product_reference": "libtiff5-4.0.9-44.71.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-44.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x"
},
"product_reference": "libtiff5-4.0.9-44.71.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-44.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64"
},
"product_reference": "libtiff5-4.0.9-44.71.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-32bit-4.0.9-44.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x"
},
"product_reference": "libtiff5-32bit-4.0.9-44.71.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-32bit-4.0.9-44.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64"
},
"product_reference": "libtiff5-32bit-4.0.9-44.71.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-44.71.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64"
},
"product_reference": "tiff-4.0.9-44.71.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-44.71.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le"
},
"product_reference": "tiff-4.0.9-44.71.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-44.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x"
},
"product_reference": "tiff-4.0.9-44.71.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-44.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64"
},
"product_reference": "tiff-4.0.9-44.71.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-18768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-18768"
}
],
"notes": [
{
"category": "general",
"text": "There exists one heap buffer overflow in _TIFFmemcpy in tif_unix.c in libtiff 4.0.10, which allows an attacker to cause a denial-of-service through a crafted tiff file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-18768",
"url": "https://www.suse.com/security/cve/CVE-2020-18768"
},
{
"category": "external",
"summary": "SUSE Bug 1214574 for CVE-2020-18768",
"url": "https://bugzilla.suse.com/1214574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:52:20Z",
"details": "moderate"
}
],
"title": "CVE-2020-18768"
},
{
"cve": "CVE-2023-25433",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-25433"
}
],
"notes": [
{
"category": "general",
"text": "libtiff 4.5.0 is vulnerable to Buffer Overflow via /libtiff/tools/tiffcrop.c:8499. Incorrect updating of buffer size after rotateImage() in tiffcrop cause heap-buffer-overflow and SEGV.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-25433",
"url": "https://www.suse.com/security/cve/CVE-2023-25433"
},
{
"category": "external",
"summary": "SUSE Bug 1212883 for CVE-2023-25433",
"url": "https://bugzilla.suse.com/1212883"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:52:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-25433"
},
{
"cve": "CVE-2023-26966",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-26966"
}
],
"notes": [
{
"category": "general",
"text": "libtiff 4.5.0 is vulnerable to Buffer Overflow in uv_encode() when libtiff reads a corrupted little-endian TIFF file and specifies the output to be big-endian.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-26966",
"url": "https://www.suse.com/security/cve/CVE-2023-26966"
},
{
"category": "external",
"summary": "SUSE Bug 1212881 for CVE-2023-26966",
"url": "https://bugzilla.suse.com/1212881"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:52:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-26966"
},
{
"cve": "CVE-2023-2908",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2908"
}
],
"notes": [
{
"category": "general",
"text": "A null pointer dereference issue was found in Libtiff\u0027s tif_dir.c file. This issue may allow an attacker to pass a crafted TIFF image file to the tiffcp utility which triggers a runtime error that causes undefined behavior. This will result in an application crash, eventually leading to a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2908",
"url": "https://www.suse.com/security/cve/CVE-2023-2908"
},
{
"category": "external",
"summary": "SUSE Bug 1212888 for CVE-2023-2908",
"url": "https://bugzilla.suse.com/1212888"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:52:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-2908"
},
{
"cve": "CVE-2023-3316",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3316"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference in TIFFClose() is caused by a failure to open an output file (non-existent path or a path that requires permissions like /dev/null) while specifying zones.\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3316",
"url": "https://www.suse.com/security/cve/CVE-2023-3316"
},
{
"category": "external",
"summary": "SUSE Bug 1212535 for CVE-2023-3316",
"url": "https://bugzilla.suse.com/1212535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:52:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-3316"
},
{
"cve": "CVE-2023-3576",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3576"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak flaw was found in Libtiff\u0027s tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3576",
"url": "https://www.suse.com/security/cve/CVE-2023-3576"
},
{
"category": "external",
"summary": "SUSE Bug 1213273 for CVE-2023-3576",
"url": "https://bugzilla.suse.com/1213273"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:52:20Z",
"details": "low"
}
],
"title": "CVE-2023-3576"
},
{
"cve": "CVE-2023-3618",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3618"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to a buffer overflow in the Fax3Encode function in libtiff/tif_fax3.c, resulting in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3618",
"url": "https://www.suse.com/security/cve/CVE-2023-3618"
},
{
"category": "external",
"summary": "SUSE Bug 1213274 for CVE-2023-3618",
"url": "https://bugzilla.suse.com/1213274"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:52:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-3618"
},
{
"cve": "CVE-2023-38288",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-38288"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** Not a Security Issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-38288",
"url": "https://www.suse.com/security/cve/CVE-2023-38288"
},
{
"category": "external",
"summary": "SUSE Bug 1213590 for CVE-2023-38288",
"url": "https://bugzilla.suse.com/1213590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:52:20Z",
"details": "low"
}
],
"title": "CVE-2023-38288"
},
{
"cve": "CVE-2023-38289",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-38289"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** Not a Security Issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-38289",
"url": "https://www.suse.com/security/cve/CVE-2023-38289"
},
{
"category": "external",
"summary": "SUSE Bug 1213589 for CVE-2023-38289",
"url": "https://bugzilla.suse.com/1213589"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:52:20Z",
"details": "low"
}
],
"title": "CVE-2023-38289"
}
]
}
suse-su-2023:4370-1
Vulnerability from csaf_suse
Published
2023-11-06 08:51
Modified
2023-11-06 08:51
Summary
Security update for tiff
Notes
Title of the patch
Security update for tiff
Description of the patch
This update for tiff fixes the following issues:
- CVE-2023-38289: Fixed a NULL pointer dereference in raw2tiff
(bsc#1213589).
- CVE-2023-38288: Fixed an integer overflow in raw2tiff (bsc#1213590).
- CVE-2023-3576: Fixed a memory leak in tiffcrop (bsc#1213273).
- CVE-2020-18768: Fixed an out of bounds read in tiffcp (bsc#1214574).
- CVE-2023-26966: Fixed an out of bounds read when transforming a
little-endian file to a big-endian output (bsc#1212881)
- CVE-2023-3618: Fixed a NULL pointer dereference while encoding FAX3
files (bsc#1213274).
- CVE-2023-2908: Fixed an undefined behavior issue when doing pointer
arithmetic on a NULL pointer (bsc#1212888).
- CVE-2023-3316: Fixed a NULL pointer dereference while opening a file
in an inaccessible path (bsc#1212535).
- CVE-2023-25433: Fixed a buffer overflow in tiffcrop (bsc#1212883).
Patchnames
SUSE-2023-4370,SUSE-SLE-Micro-5.3-2023-4370,SUSE-SLE-Micro-5.4-2023-4370,SUSE-SLE-Micro-5.5-2023-4370,SUSE-SLE-Module-Basesystem-15-SP4-2023-4370,SUSE-SLE-Module-Basesystem-15-SP5-2023-4370,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-4370,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-4370,SUSE-SUSE-MicroOS-5.2-2023-4370,openSUSE-Leap-Micro-5.3-2023-4370,openSUSE-Leap-Micro-5.4-2023-4370,openSUSE-SLE-15.4-2023-4370,openSUSE-SLE-15.5-2023-4370
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for tiff",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for tiff fixes the following issues:\n\n- CVE-2023-38289: Fixed a NULL pointer dereference in raw2tiff\n (bsc#1213589).\n- CVE-2023-38288: Fixed an integer overflow in raw2tiff (bsc#1213590).\n- CVE-2023-3576: Fixed a memory leak in tiffcrop (bsc#1213273).\n- CVE-2020-18768: Fixed an out of bounds read in tiffcp (bsc#1214574).\n- CVE-2023-26966: Fixed an out of bounds read when transforming a\n little-endian file to a big-endian output (bsc#1212881)\n- CVE-2023-3618: Fixed a NULL pointer dereference while encoding FAX3\n files (bsc#1213274).\n- CVE-2023-2908: Fixed an undefined behavior issue when doing pointer\n arithmetic on a NULL pointer (bsc#1212888).\n- CVE-2023-3316: Fixed a NULL pointer dereference while opening a file\n in an inaccessible path (bsc#1212535).\n- CVE-2023-25433: Fixed a buffer overflow in tiffcrop (bsc#1212883).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-4370,SUSE-SLE-Micro-5.3-2023-4370,SUSE-SLE-Micro-5.4-2023-4370,SUSE-SLE-Micro-5.5-2023-4370,SUSE-SLE-Module-Basesystem-15-SP4-2023-4370,SUSE-SLE-Module-Basesystem-15-SP5-2023-4370,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-4370,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-4370,SUSE-SUSE-MicroOS-5.2-2023-4370,openSUSE-Leap-Micro-5.3-2023-4370,openSUSE-Leap-Micro-5.4-2023-4370,openSUSE-SLE-15.4-2023-4370,openSUSE-SLE-15.5-2023-4370",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4370-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:4370-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20234370-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:4370-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-November/017000.html"
},
{
"category": "self",
"summary": "SUSE Bug 1212535",
"url": "https://bugzilla.suse.com/1212535"
},
{
"category": "self",
"summary": "SUSE Bug 1212881",
"url": "https://bugzilla.suse.com/1212881"
},
{
"category": "self",
"summary": "SUSE Bug 1212883",
"url": "https://bugzilla.suse.com/1212883"
},
{
"category": "self",
"summary": "SUSE Bug 1212888",
"url": "https://bugzilla.suse.com/1212888"
},
{
"category": "self",
"summary": "SUSE Bug 1213273",
"url": "https://bugzilla.suse.com/1213273"
},
{
"category": "self",
"summary": "SUSE Bug 1213274",
"url": "https://bugzilla.suse.com/1213274"
},
{
"category": "self",
"summary": "SUSE Bug 1213589",
"url": "https://bugzilla.suse.com/1213589"
},
{
"category": "self",
"summary": "SUSE Bug 1213590",
"url": "https://bugzilla.suse.com/1213590"
},
{
"category": "self",
"summary": "SUSE Bug 1214574",
"url": "https://bugzilla.suse.com/1214574"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-18768 page",
"url": "https://www.suse.com/security/cve/CVE-2020-18768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-25433 page",
"url": "https://www.suse.com/security/cve/CVE-2023-25433/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-26966 page",
"url": "https://www.suse.com/security/cve/CVE-2023-26966/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2908 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2908/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3316 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3316/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3576 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3576/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3618 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3618/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-38288 page",
"url": "https://www.suse.com/security/cve/CVE-2023-38288/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-38289 page",
"url": "https://www.suse.com/security/cve/CVE-2023-38289/"
}
],
"title": "Security update for tiff",
"tracking": {
"current_release_date": "2023-11-06T08:51:27Z",
"generator": {
"date": "2023-11-06T08:51:27Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:4370-1",
"initial_release_date": "2023-11-06T08:51:27Z",
"revision_history": [
{
"date": "2023-11-06T08:51:27Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"product": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"product_id": "libtiff-devel-4.0.9-150000.45.32.1.aarch64"
}
},
{
"category": "product_version",
"name": "libtiff5-4.0.9-150000.45.32.1.aarch64",
"product": {
"name": "libtiff5-4.0.9-150000.45.32.1.aarch64",
"product_id": "libtiff5-4.0.9-150000.45.32.1.aarch64"
}
},
{
"category": "product_version",
"name": "tiff-4.0.9-150000.45.32.1.aarch64",
"product": {
"name": "tiff-4.0.9-150000.45.32.1.aarch64",
"product_id": "tiff-4.0.9-150000.45.32.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-64bit-4.0.9-150000.45.32.1.aarch64_ilp32",
"product": {
"name": "libtiff-devel-64bit-4.0.9-150000.45.32.1.aarch64_ilp32",
"product_id": "libtiff-devel-64bit-4.0.9-150000.45.32.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libtiff5-64bit-4.0.9-150000.45.32.1.aarch64_ilp32",
"product": {
"name": "libtiff5-64bit-4.0.9-150000.45.32.1.aarch64_ilp32",
"product_id": "libtiff5-64bit-4.0.9-150000.45.32.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-4.0.9-150000.45.32.1.i586",
"product": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.i586",
"product_id": "libtiff-devel-4.0.9-150000.45.32.1.i586"
}
},
{
"category": "product_version",
"name": "libtiff5-4.0.9-150000.45.32.1.i586",
"product": {
"name": "libtiff5-4.0.9-150000.45.32.1.i586",
"product_id": "libtiff5-4.0.9-150000.45.32.1.i586"
}
},
{
"category": "product_version",
"name": "tiff-4.0.9-150000.45.32.1.i586",
"product": {
"name": "tiff-4.0.9-150000.45.32.1.i586",
"product_id": "tiff-4.0.9-150000.45.32.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"product": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"product_id": "libtiff-devel-4.0.9-150000.45.32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libtiff5-4.0.9-150000.45.32.1.ppc64le",
"product": {
"name": "libtiff5-4.0.9-150000.45.32.1.ppc64le",
"product_id": "libtiff5-4.0.9-150000.45.32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "tiff-4.0.9-150000.45.32.1.ppc64le",
"product": {
"name": "tiff-4.0.9-150000.45.32.1.ppc64le",
"product_id": "tiff-4.0.9-150000.45.32.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-4.0.9-150000.45.32.1.s390x",
"product": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.s390x",
"product_id": "libtiff-devel-4.0.9-150000.45.32.1.s390x"
}
},
{
"category": "product_version",
"name": "libtiff5-4.0.9-150000.45.32.1.s390x",
"product": {
"name": "libtiff5-4.0.9-150000.45.32.1.s390x",
"product_id": "libtiff5-4.0.9-150000.45.32.1.s390x"
}
},
{
"category": "product_version",
"name": "tiff-4.0.9-150000.45.32.1.s390x",
"product": {
"name": "tiff-4.0.9-150000.45.32.1.s390x",
"product_id": "tiff-4.0.9-150000.45.32.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"product": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"product_id": "libtiff-devel-4.0.9-150000.45.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"product": {
"name": "libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"product_id": "libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "libtiff5-4.0.9-150000.45.32.1.x86_64",
"product": {
"name": "libtiff5-4.0.9-150000.45.32.1.x86_64",
"product_id": "libtiff5-4.0.9-150000.45.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"product": {
"name": "libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"product_id": "libtiff5-32bit-4.0.9-150000.45.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "tiff-4.0.9-150000.45.32.1.x86_64",
"product": {
"name": "tiff-4.0.9-150000.45.32.1.x86_64",
"product_id": "tiff-4.0.9-150000.45.32.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap Micro 5.3",
"product": {
"name": "openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap Micro 5.4",
"product": {
"name": "openSUSE Leap Micro 5.4",
"product_id": "openSUSE Leap Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap-micro:5.4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-32bit-4.0.9-150000.45.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-32bit-4.0.9-150000.45.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.aarch64 as component of openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.x86_64 as component of openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.aarch64 as component of openSUSE Leap Micro 5.4",
"product_id": "openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.s390x as component of openSUSE Leap Micro 5.4",
"product_id": "openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "openSUSE Leap Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.x86_64 as component of openSUSE Leap Micro 5.4",
"product_id": "openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-32bit-4.0.9-150000.45.32.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-32bit-4.0.9-150000.45.32.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-18768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-18768"
}
],
"notes": [
{
"category": "general",
"text": "There exists one heap buffer overflow in _TIFFmemcpy in tif_unix.c in libtiff 4.0.10, which allows an attacker to cause a denial-of-service through a crafted tiff file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-18768",
"url": "https://www.suse.com/security/cve/CVE-2020-18768"
},
{
"category": "external",
"summary": "SUSE Bug 1214574 for CVE-2020-18768",
"url": "https://bugzilla.suse.com/1214574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:51:27Z",
"details": "moderate"
}
],
"title": "CVE-2020-18768"
},
{
"cve": "CVE-2023-25433",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-25433"
}
],
"notes": [
{
"category": "general",
"text": "libtiff 4.5.0 is vulnerable to Buffer Overflow via /libtiff/tools/tiffcrop.c:8499. Incorrect updating of buffer size after rotateImage() in tiffcrop cause heap-buffer-overflow and SEGV.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-25433",
"url": "https://www.suse.com/security/cve/CVE-2023-25433"
},
{
"category": "external",
"summary": "SUSE Bug 1212883 for CVE-2023-25433",
"url": "https://bugzilla.suse.com/1212883"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:51:27Z",
"details": "moderate"
}
],
"title": "CVE-2023-25433"
},
{
"cve": "CVE-2023-26966",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-26966"
}
],
"notes": [
{
"category": "general",
"text": "libtiff 4.5.0 is vulnerable to Buffer Overflow in uv_encode() when libtiff reads a corrupted little-endian TIFF file and specifies the output to be big-endian.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-26966",
"url": "https://www.suse.com/security/cve/CVE-2023-26966"
},
{
"category": "external",
"summary": "SUSE Bug 1212881 for CVE-2023-26966",
"url": "https://bugzilla.suse.com/1212881"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:51:27Z",
"details": "moderate"
}
],
"title": "CVE-2023-26966"
},
{
"cve": "CVE-2023-2908",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2908"
}
],
"notes": [
{
"category": "general",
"text": "A null pointer dereference issue was found in Libtiff\u0027s tif_dir.c file. This issue may allow an attacker to pass a crafted TIFF image file to the tiffcp utility which triggers a runtime error that causes undefined behavior. This will result in an application crash, eventually leading to a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2908",
"url": "https://www.suse.com/security/cve/CVE-2023-2908"
},
{
"category": "external",
"summary": "SUSE Bug 1212888 for CVE-2023-2908",
"url": "https://bugzilla.suse.com/1212888"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:51:27Z",
"details": "moderate"
}
],
"title": "CVE-2023-2908"
},
{
"cve": "CVE-2023-3316",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3316"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference in TIFFClose() is caused by a failure to open an output file (non-existent path or a path that requires permissions like /dev/null) while specifying zones.\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3316",
"url": "https://www.suse.com/security/cve/CVE-2023-3316"
},
{
"category": "external",
"summary": "SUSE Bug 1212535 for CVE-2023-3316",
"url": "https://bugzilla.suse.com/1212535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:51:27Z",
"details": "moderate"
}
],
"title": "CVE-2023-3316"
},
{
"cve": "CVE-2023-3576",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3576"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak flaw was found in Libtiff\u0027s tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3576",
"url": "https://www.suse.com/security/cve/CVE-2023-3576"
},
{
"category": "external",
"summary": "SUSE Bug 1213273 for CVE-2023-3576",
"url": "https://bugzilla.suse.com/1213273"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:51:27Z",
"details": "low"
}
],
"title": "CVE-2023-3576"
},
{
"cve": "CVE-2023-3618",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3618"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to a buffer overflow in the Fax3Encode function in libtiff/tif_fax3.c, resulting in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3618",
"url": "https://www.suse.com/security/cve/CVE-2023-3618"
},
{
"category": "external",
"summary": "SUSE Bug 1213274 for CVE-2023-3618",
"url": "https://bugzilla.suse.com/1213274"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:51:27Z",
"details": "moderate"
}
],
"title": "CVE-2023-3618"
},
{
"cve": "CVE-2023-38288",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-38288"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** Not a Security Issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-38288",
"url": "https://www.suse.com/security/cve/CVE-2023-38288"
},
{
"category": "external",
"summary": "SUSE Bug 1213590 for CVE-2023-38288",
"url": "https://bugzilla.suse.com/1213590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:51:27Z",
"details": "low"
}
],
"title": "CVE-2023-38288"
},
{
"cve": "CVE-2023-38289",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-38289"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** Not a Security Issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-38289",
"url": "https://www.suse.com/security/cve/CVE-2023-38289"
},
{
"category": "external",
"summary": "SUSE Bug 1213589 for CVE-2023-38289",
"url": "https://bugzilla.suse.com/1213589"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:51:27Z",
"details": "low"
}
],
"title": "CVE-2023-38289"
}
]
}
gsd-2023-2908
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
A null pointer dereference issue was found in Libtiff's tif_dir.c file. This issue may allow an attacker to pass a crafted TIFF image file to the tiffcp utility which triggers a runtime error that causes undefined behavior. This will result in an application crash, eventually leading to a denial of service.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2023-2908",
"id": "GSD-2023-2908"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-2908"
],
"details": "A null pointer dereference issue was found in Libtiff\u0027s tif_dir.c file. This issue may allow an attacker to pass a crafted TIFF image file to the tiffcp utility which triggers a runtime error that causes undefined behavior. This will result in an application crash, eventually leading to a denial of service.",
"id": "GSD-2023-2908",
"modified": "2023-12-13T01:20:31.530373Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2023-2908",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Libtiff",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"status": "unaffected",
"version": "4.5.1rc1"
}
]
}
}
]
}
}
]
},
"vendor_name": "n/a"
},
{
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unaffected"
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unaffected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unaffected"
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unaffected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unaffected"
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unaffected"
}
}
]
}
}
]
},
"vendor_name": "Red Hat"
},
{
"product": {
"product_data": [
{
"product_name": "Fedora",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
}
]
},
"vendor_name": "Fedora"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A null pointer dereference issue was found in Libtiff\u0027s tif_dir.c file. This issue may allow an attacker to pass a crafted TIFF image file to the tiffcp utility which triggers a runtime error that causes undefined behavior. This will result in an application crash, eventually leading to a denial of service."
}
]
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-476",
"lang": "eng",
"value": "NULL Pointer Dereference"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://access.redhat.com/security/cve/CVE-2023-2908",
"refsource": "MISC",
"url": "https://access.redhat.com/security/cve/CVE-2023-2908"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2218830",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218830"
},
{
"name": "https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f",
"refsource": "MISC",
"url": "https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f"
},
{
"name": "https://gitlab.com/libtiff/libtiff/-/merge_requests/479",
"refsource": "MISC",
"url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/479"
},
{
"name": "https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html",
"refsource": "MISC",
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20230731-0004/",
"refsource": "MISC",
"url": "https://security.netapp.com/advisory/ntap-20230731-0004/"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003c=4.5.0",
"affected_versions": "All versions up to 4.5.0",
"cvss_v3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-476",
"CWE-937"
],
"date": "2023-08-02",
"description": "A null pointer dereference issue was discovered in Libtiff\u0027s tif_dir.c file. This flaw allows an attacker to pass a crafted TIFF image file to the tiffcp utility, which triggers runtime error, causing an undefined behavior, resulting in an application crash, eventually leading to a denial of service.",
"fixed_versions": [
"4.5.1"
],
"identifier": "CVE-2023-2908",
"identifiers": [
"CVE-2023-2908"
],
"not_impacted": "All versions after 4.5.0",
"package_slug": "conan/libtiff",
"pubdate": "2023-06-30",
"solution": "Upgrade to version 4.5.1 or above.",
"title": "NULL Pointer Dereference",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2023-2908",
"https://access.redhat.com/security/cve/CVE-2023-2908",
"https://bugzilla.redhat.com/show_bug.cgi?id=2218830",
"https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f",
"https://gitlab.com/libtiff/libtiff/-/merge_requests/479"
],
"uuid": "05b06a66-2156-45b3-a518-93e2fffcd299"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.5.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2023-2908"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A null pointer dereference issue was found in Libtiff\u0027s tif_dir.c file. This issue may allow an attacker to pass a crafted TIFF image file to the tiffcp utility which triggers a runtime error that causes undefined behavior. This will result in an application crash, eventually leading to a denial of service."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://access.redhat.com/security/cve/CVE-2023-2908",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2023-2908"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2218830",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218830"
},
{
"name": "https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f",
"refsource": "MISC",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f"
},
{
"name": "https://gitlab.com/libtiff/libtiff/-/merge_requests/479",
"refsource": "MISC",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/479"
},
{
"name": "https://security.netapp.com/advisory/ntap-20230731-0004/",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20230731-0004/"
},
{
"name": "https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-08-02T15:41Z",
"publishedDate": "2023-06-30T22:15Z"
}
}
}
fkie_cve-2023-2908
Vulnerability from fkie_nvd
Published
2023-06-30 22:15
Modified
2024-11-21 07:59
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Summary
A null pointer dereference issue was found in Libtiff's tif_dir.c file. This issue may allow an attacker to pass a crafted TIFF image file to the tiffcp utility which triggers a runtime error that causes undefined behavior. This will result in an application crash, eventually leading to a denial of service.
References
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2023-2908 | Third Party Advisory | |
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2218830 | Issue Tracking, Third Party Advisory | |
| secalert@redhat.com | https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f | Patch, Vendor Advisory | |
| secalert@redhat.com | https://gitlab.com/libtiff/libtiff/-/merge_requests/479 | Exploit, Vendor Advisory | |
| secalert@redhat.com | https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html | Third Party Advisory | |
| secalert@redhat.com | https://security.netapp.com/advisory/ntap-20230731-0004/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/CVE-2023-2908 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=2218830 | Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://gitlab.com/libtiff/libtiff/-/merge_requests/479 | Exploit, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20230731-0004/ | Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A17B02C6-10A4-4AAF-9D59-BEA968264451",
"versionEndIncluding": "4.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A null pointer dereference issue was found in Libtiff\u0027s tif_dir.c file. This issue may allow an attacker to pass a crafted TIFF image file to the tiffcp utility which triggers a runtime error that causes undefined behavior. This will result in an application crash, eventually leading to a denial of service."
}
],
"id": "CVE-2023-2908",
"lastModified": "2024-11-21T07:59:32.713",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-06-30T22:15:10.017",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2023-2908"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218830"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/479"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20230731-0004/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2023-2908"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218830"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/479"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20230731-0004/"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
ghsa-7278-8hvx-pp94
Vulnerability from github
Published
2023-07-01 00:30
Modified
2024-04-04 05:19
Severity ?
VLAI Severity ?
Details
A null pointer dereference issue was discovered in Libtiff's tif_dir.c file. This flaw allows an attacker to pass a crafted TIFF image file to the tiffcp utility, which triggers runtime error, causing an undefined behavior, resulting in an application crash, eventually leading to a denial of service.
{
"affected": [],
"aliases": [
"CVE-2023-2908"
],
"database_specific": {
"cwe_ids": [
"CWE-476"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2023-06-30T22:15:10Z",
"severity": "MODERATE"
},
"details": "A null pointer dereference issue was discovered in Libtiff\u0027s tif_dir.c file. This flaw allows an attacker to pass a crafted TIFF image file to the tiffcp utility, which triggers runtime error, causing an undefined behavior, resulting in an application crash, eventually leading to a denial of service.",
"id": "GHSA-7278-8hvx-pp94",
"modified": "2024-04-04T05:19:15Z",
"published": "2023-07-01T00:30:45Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2908"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2023-2908"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218830"
},
{
"type": "WEB",
"url": "https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f"
},
{
"type": "WEB",
"url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/479"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20230731-0004"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…