{"affected":[{"ecosystem_specific":{"binaries":[{"libtiff5":"4.0.9-44.30.1","libtiff5-32bit":"4.0.9-44.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP3","name":"tiff","purl":"pkg:rpm/suse/tiff&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.0.9-44.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libtiff5":"4.0.9-44.30.1","libtiff5-32bit":"4.0.9-44.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP4","name":"tiff","purl":"pkg:rpm/suse/tiff&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.0.9-44.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libtiff-devel":"4.0.9-44.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP3","name":"tiff","purl":"pkg:rpm/suse/tiff&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.0.9-44.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libtiff-devel":"4.0.9-44.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP4","name":"tiff","purl":"pkg:rpm/suse/tiff&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.0.9-44.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libtiff5":"4.0.9-44.30.1","libtiff5-32bit":"4.0.9-44.30.1","tiff":"4.0.9-44.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP3","name":"tiff","purl":"pkg:rpm/suse/tiff&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.0.9-44.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libtiff5":"4.0.9-44.30.1","libtiff5-32bit":"4.0.9-44.30.1","tiff":"4.0.9-44.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","name":"tiff","purl":"pkg:rpm/suse/tiff&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.0.9-44.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libtiff5":"4.0.9-44.30.1","libtiff5-32bit":"4.0.9-44.30.1","tiff":"4.0.9-44.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP4","name":"tiff","purl":"pkg:rpm/suse/tiff&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.0.9-44.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libtiff5":"4.0.9-44.30.1","libtiff5-32bit":"4.0.9-44.30.1","tiff":"4.0.9-44.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP4","name":"tiff","purl":"pkg:rpm/suse/tiff&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.0.9-44.30.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for tiff fixes the following issues:\n\nSecurity issues fixed:                                   \n    \n- CVE-2018-19210: Fixed NULL pointer dereference in the TIFFWriteDirectorySec function (bsc#1115717).\n- CVE-2017-12944: Fixed denial of service issue in the TIFFReadDirEntryArray function (bsc#1054594).\n- CVE-2016-10094: Fixed heap-based buffer overflow in the _tiffWriteProc function (bsc#1017693).\n- CVE-2016-10093: Fixed heap-based buffer overflow in the _TIFFmemcpy function (bsc#1017693).\n- CVE-2016-10092: Fixed heap-based buffer overflow in the TIFFReverseBits function (bsc#1017693).\n- CVE-2016-6223: Fixed out-of-bounds read on memory-mapped files in TIFFReadRawStrip1() and TIFFReadRawTile1() (bsc#990460).\n","id":"SUSE-SU-2018:4191-1","modified":"2018-12-19T13:17:26Z","published":"2018-12-19T13:17:26Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20184191-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1017693"},{"type":"REPORT","url":"https://bugzilla.suse.com/1054594"},{"type":"REPORT","url":"https://bugzilla.suse.com/1115717"},{"type":"REPORT","url":"https://bugzilla.suse.com/990460"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10092"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10093"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10094"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6223"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-12944"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-19210"}],"related":["CVE-2016-10092","CVE-2016-10093","CVE-2016-10094","CVE-2016-6223","CVE-2017-12944","CVE-2018-19210"],"summary":"Security update for tiff","upstream":["CVE-2016-10092","CVE-2016-10093","CVE-2016-10094","CVE-2016-6223","CVE-2017-12944","CVE-2018-19210"]}