{"affected":[{"ecosystem_specific":{"binaries":[{"libtiff-devel":"4.0.9-44.71.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP5","name":"tiff","purl":"pkg:rpm/suse/tiff&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.0.9-44.71.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libtiff5":"4.0.9-44.71.1","libtiff5-32bit":"4.0.9-44.71.1","tiff":"4.0.9-44.71.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"tiff","purl":"pkg:rpm/suse/tiff&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.0.9-44.71.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libtiff5":"4.0.9-44.71.1","libtiff5-32bit":"4.0.9-44.71.1","tiff":"4.0.9-44.71.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"tiff","purl":"pkg:rpm/suse/tiff&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.0.9-44.71.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for tiff fixes the following issues:\n\n- CVE-2023-38289: Fixed a NULL pointer dereference in raw2tiff\n  (bsc#1213589).\n- CVE-2023-38288: Fixed an integer overflow in raw2tiff (bsc#1213590).\n- CVE-2023-3576: Fixed a memory leak in tiffcrop (bsc#1213273).\n- CVE-2020-18768: Fixed an out of bounds read in tiffcp (bsc#1214574).\n- CVE-2023-26966: Fixed an out of bounds read when transforming a\n  little-endian file to a big-endian output (bsc#1212881)\n- CVE-2023-3618: Fixed a NULL pointer dereference while encoding FAX3\n  files (bsc#1213274).\n- CVE-2023-2908: Fixed an undefined behavior issue when doing pointer\n  arithmetic on a NULL pointer (bsc#1212888).\n- CVE-2023-3316: Fixed a NULL pointer dereference while opening a file\n  in an inaccessible path (bsc#1212535).\n- CVE-2023-25433: Fixed a buffer overflow in tiffcrop (bsc#1212883).\n","id":"SUSE-SU-2023:4371-1","modified":"2023-11-06T08:52:20Z","published":"2023-11-06T08:52:20Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20234371-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1212535"},{"type":"REPORT","url":"https://bugzilla.suse.com/1212881"},{"type":"REPORT","url":"https://bugzilla.suse.com/1212883"},{"type":"REPORT","url":"https://bugzilla.suse.com/1212888"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213273"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213274"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213589"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213590"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214574"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-18768"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-25433"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-26966"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-2908"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-3316"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-3576"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-3618"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-38288"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-38289"}],"related":["CVE-2020-18768","CVE-2023-25433","CVE-2023-26966","CVE-2023-2908","CVE-2023-3316","CVE-2023-3576","CVE-2023-3618","CVE-2023-38288","CVE-2023-38289"],"summary":"Security update for tiff","upstream":["CVE-2020-18768","CVE-2023-25433","CVE-2023-26966","CVE-2023-2908","CVE-2023-3316","CVE-2023-3576","CVE-2023-3618","CVE-2023-38288","CVE-2023-38289"]}