<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libtiff-devel-32bit-4.0.7-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10554-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libtiff-devel-32bit-4.0.7-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libtiff-devel-32bit-4.0.7-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10554</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-2285/</URL>
      <Description>SUSE CVE CVE-2009-2285 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-2347/</URL>
      <Description>SUSE CVE CVE-2009-2347 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-2065/</URL>
      <Description>SUSE CVE CVE-2010-2065 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-2067/</URL>
      <Description>SUSE CVE CVE-2010-2067 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-2233/</URL>
      <Description>SUSE CVE CVE-2010-2233 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-4665/</URL>
      <Description>SUSE CVE CVE-2010-4665 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-0192/</URL>
      <Description>SUSE CVE CVE-2011-0192 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-1167/</URL>
      <Description>SUSE CVE CVE-2011-1167 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-1173/</URL>
      <Description>SUSE CVE CVE-2012-1173 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-2113/</URL>
      <Description>SUSE CVE CVE-2012-2113 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-3401/</URL>
      <Description>SUSE CVE CVE-2012-3401 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-4564/</URL>
      <Description>SUSE CVE CVE-2012-4564 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1960/</URL>
      <Description>SUSE CVE CVE-2013-1960 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1961/</URL>
      <Description>SUSE CVE CVE-2013-1961 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4231/</URL>
      <Description>SUSE CVE CVE-2013-4231 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4232/</URL>
      <Description>SUSE CVE CVE-2013-4232 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4243/</URL>
      <Description>SUSE CVE CVE-2013-4243 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4244/</URL>
      <Description>SUSE CVE CVE-2013-4244 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-8127/</URL>
      <Description>SUSE CVE CVE-2014-8127 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-8128/</URL>
      <Description>SUSE CVE CVE-2014-8128 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-8129/</URL>
      <Description>SUSE CVE CVE-2014-8129 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-8130/</URL>
      <Description>SUSE CVE CVE-2014-8130 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9655/</URL>
      <Description>SUSE CVE CVE-2014-9655 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1547/</URL>
      <Description>SUSE CVE CVE-2015-1547 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7554/</URL>
      <Description>SUSE CVE CVE-2015-7554 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8665/</URL>
      <Description>SUSE CVE CVE-2015-8665 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8683/</URL>
      <Description>SUSE CVE CVE-2015-8683 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8781/</URL>
      <Description>SUSE CVE CVE-2015-8781 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8782/</URL>
      <Description>SUSE CVE CVE-2015-8782 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8783/</URL>
      <Description>SUSE CVE CVE-2015-8783 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3186/</URL>
      <Description>SUSE CVE CVE-2016-3186 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3622/</URL>
      <Description>SUSE CVE CVE-2016-3622 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3623/</URL>
      <Description>SUSE CVE CVE-2016-3623 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3658/</URL>
      <Description>SUSE CVE CVE-2016-3658 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3945/</URL>
      <Description>SUSE CVE CVE-2016-3945 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3990/</URL>
      <Description>SUSE CVE CVE-2016-3990 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3991/</URL>
      <Description>SUSE CVE CVE-2016-3991 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5314/</URL>
      <Description>SUSE CVE CVE-2016-5314 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5316/</URL>
      <Description>SUSE CVE CVE-2016-5316 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5317/</URL>
      <Description>SUSE CVE CVE-2016-5317 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5320/</URL>
      <Description>SUSE CVE CVE-2016-5320 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5321/</URL>
      <Description>SUSE CVE CVE-2016-5321 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5323/</URL>
      <Description>SUSE CVE CVE-2016-5323 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5652/</URL>
      <Description>SUSE CVE CVE-2016-5652 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5875/</URL>
      <Description>SUSE CVE CVE-2016-5875 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9273/</URL>
      <Description>SUSE CVE CVE-2016-9273 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9297/</URL>
      <Description>SUSE CVE CVE-2016-9297 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9448/</URL>
      <Description>SUSE CVE CVE-2016-9448 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9453/</URL>
      <Description>SUSE CVE CVE-2016-9453 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libtiff-devel-4.0.7-1.1">
      <FullProductName ProductID="libtiff-devel-4.0.7-1.1">libtiff-devel-4.0.7-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtiff-devel-32bit-4.0.7-1.1">
      <FullProductName ProductID="libtiff-devel-32bit-4.0.7-1.1">libtiff-devel-32bit-4.0.7-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtiff5-4.0.7-1.1">
      <FullProductName ProductID="libtiff5-4.0.7-1.1">libtiff5-4.0.7-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtiff5-32bit-4.0.7-1.1">
      <FullProductName ProductID="libtiff5-32bit-4.0.7-1.1">libtiff5-32bit-4.0.7-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tiff-4.0.7-1.1">
      <FullProductName ProductID="tiff-4.0.7-1.1">tiff-4.0.7-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libtiff-devel-4.0.7-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1">libtiff-devel-4.0.7-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtiff-devel-32bit-4.0.7-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1">libtiff-devel-32bit-4.0.7-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtiff5-4.0.7-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libtiff5-4.0.7-1.1">libtiff5-4.0.7-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtiff5-32bit-4.0.7-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1">libtiff5-32bit-4.0.7-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tiff-4.0.7-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tiff-4.0.7-1.1">tiff-4.0.7-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer underflow in the LZWDecodeCompat function in libtiff 3.8.2 allows context-dependent attackers to cause a denial of service (crash) via a crafted TIFF image, a different vulnerability than CVE-2008-2327.</Note>
    </Notes>
    <CVE>CVE-2009-2285</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-2285.html</URL>
        <Description>CVE-2009-2285</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/518698</URL>
        <Description>SUSE Bug 518698</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer overflows in inter-color spaces conversion tools in libtiff 3.8 through 3.8.2, 3.9, and 4.0 allow context-dependent attackers to execute arbitrary code via a TIFF image with large (1) width and (2) height values, which triggers a heap-based buffer overflow in the (a) cvt_whole_image function in tiff2rgba and (b) tiffcvt function in rgb2ycbcr.</Note>
    </Notes>
    <CVE>CVE-2009-2347</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-2347.html</URL>
        <Description>CVE-2009-2347</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/519796</URL>
        <Description>SUSE Bug 519796</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/616827</URL>
        <Description>SUSE Bug 616827</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the TIFFroundup macro in LibTIFF before 3.9.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TIFF file that triggers a buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2010-2065</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-2065.html</URL>
        <Description>CVE-2010-2065</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/612787</URL>
        <Description>SUSE Bug 612787</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/612879</URL>
        <Description>SUSE Bug 612879</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the TIFFFetchSubjectDistance function in tif_dirread.c in LibTIFF before 3.9.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long EXIF SubjectDistance field in a TIFF file.</Note>
    </Notes>
    <CVE>CVE-2010-2067</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-2067.html</URL>
        <Description>CVE-2010-2067</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/612787</URL>
        <Description>SUSE Bug 612787</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/612879</URL>
        <Description>SUSE Bug 612879</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tif_getimage.c in LibTIFF 3.9.0 and 3.9.2 on 64-bit platforms, as used in ImageMagick, does not properly perform vertical flips, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TIFF image, related to "downsampled OJPEG input."</Note>
    </Notes>
    <CVE>CVE-2010-2233</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-2233.html</URL>
        <Description>CVE-2010-2233</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/612879</URL>
        <Description>SUSE Bug 612879</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the ReadDirectory function in tiffdump.c in tiffdump in LibTIFF before 3.9.5 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF file containing a directory data structure with many directory entries.</Note>
    </Notes>
    <CVE>CVE-2010-4665</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-4665.html</URL>
        <Description>CVE-2010-4665</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/687442</URL>
        <Description>SUSE Bug 687442</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/854393</URL>
        <Description>SUSE Bug 854393</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in Fax4Decode in LibTIFF 3.9.4 and possibly other versions, as used in ImageIO in Apple iTunes before 10.2 on Windows and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF Internet Fax image file that has been compressed using CCITT Group 4 encoding, related to the EXPAND2D macro in libtiff/tif_fax3.h.  NOTE: some of these details are obtained from third party information.</Note>
    </Notes>
    <CVE>CVE-2011-0192</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-0192.html</URL>
        <Description>CVE-2011-0192</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/672510</URL>
        <Description>SUSE Bug 672510</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/682053</URL>
        <Description>SUSE Bug 682053</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/682871</URL>
        <Description>SUSE Bug 682871</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/854393</URL>
        <Description>SUSE Bug 854393</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the thunder (aka ThunderScan) decoder in tif_thunder.c in LibTIFF 3.9.4 and earlier allows remote attackers to execute arbitrary code via crafted THUNDER_2BITDELTAS data in a .tiff file that has an unexpected BitsPerSample value.</Note>
    </Notes>
    <CVE>CVE-2011-1167</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-1167.html</URL>
        <Description>CVE-2011-1167</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/683337</URL>
        <Description>SUSE Bug 683337</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/854393</URL>
        <Description>SUSE Bug 854393</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer overflows in tiff_getimage.c in LibTIFF 3.9.4 allow remote attackers to execute arbitrary code via a crafted tile size in a TIFF file, which is not properly handled by the (1) gtTileSeparate or (2) gtStripSeparate function, leading to a heap-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2012-1173</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-1173.html</URL>
        <Description>CVE-2012-1173</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/753362</URL>
        <Description>SUSE Bug 753362</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/767852</URL>
        <Description>SUSE Bug 767852</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/854393</URL>
        <Description>SUSE Bug 854393</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer overflows in tiff2pdf in libtiff before 4.0.2 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2012-2113</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-2113.html</URL>
        <Description>CVE-2012-2113</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/767852</URL>
        <Description>SUSE Bug 767852</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/854393</URL>
        <Description>SUSE Bug 854393</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The t2p_read_tiff_init function in tiff2pdf (tools/tiff2pdf.c) in LibTIFF 4.0.2 and earlier does not properly initialize the T2P context struct pointer in certain error conditions, which allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image that triggers a heap-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2012-3401</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-3401.html</URL>
        <Description>CVE-2012-3401</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/770816</URL>
        <Description>SUSE Bug 770816</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/854393</URL>
        <Description>SUSE Bug 854393</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2012-4564</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-4564.html</URL>
        <Description>CVE-2012-4564</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/781995</URL>
        <Description>SUSE Bug 781995</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/787892</URL>
        <Description>SUSE Bug 787892</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/791607</URL>
        <Description>SUSE Bug 791607</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/854393</URL>
        <Description>SUSE Bug 854393</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the t2p_process_jpeg_strip function in tiff2pdf in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image file.</Note>
    </Notes>
    <CVE>CVE-2013-1960</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1960.html</URL>
        <Description>CVE-2013-1960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/817573</URL>
        <Description>SUSE Bug 817573</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/854393</URL>
        <Description>SUSE Bug 854393</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the t2p_write_pdf_page function in tiff2pdf in libtiff before 4.0.3 allows remote attackers to cause a denial of service (application crash) via a crafted image length and resolution in a TIFF image file.</Note>
    </Notes>
    <CVE>CVE-2013-1961</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1961.html</URL>
        <Description>CVE-2013-1961</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/817573</URL>
        <Description>SUSE Bug 817573</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/818117</URL>
        <Description>SUSE Bug 818117</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/854393</URL>
        <Description>SUSE Bug 854393</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size.</Note>
    </Notes>
    <CVE>CVE-2013-4231</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4231.html</URL>
        <Description>CVE-2013-4231</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/834477</URL>
        <Description>SUSE Bug 834477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/854393</URL>
        <Description>SUSE Bug 854393</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969783</URL>
        <Description>SUSE Bug 969783</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the t2p_readwrite_pdf_image function in tools/tiff2pdf.c in libtiff 4.0.3 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted TIFF image.</Note>
    </Notes>
    <CVE>CVE-2013-4232</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4232.html</URL>
        <Description>CVE-2013-4232</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/834477</URL>
        <Description>SUSE Bug 834477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/854393</URL>
        <Description>SUSE Bug 854393</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969783</URL>
        <Description>SUSE Bug 969783</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the readgifimage function in the gif2tiff tool in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted height and width values in a GIF image.</Note>
    </Notes>
    <CVE>CVE-2013-4243</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4243.html</URL>
        <Description>CVE-2013-4243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/834779</URL>
        <Description>SUSE Bug 834779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/854393</URL>
        <Description>SUSE Bug 854393</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969783</URL>
        <Description>SUSE Bug 969783</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image.</Note>
    </Notes>
    <CVE>CVE-2013-4244</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4244.html</URL>
        <Description>CVE-2013-4244</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/834788</URL>
        <Description>SUSE Bug 834788</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/854393</URL>
        <Description>SUSE Bug 854393</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969783</URL>
        <Description>SUSE Bug 969783</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted TIFF image to the (1) checkInkNamesString function in tif_dir.c in the thumbnail tool, (2) compresscontig function in tiff2bw.c in the tiff2bw tool, (3) putcontig8bitCIELab function in tif_getimage.c in the tiff2rgba tool, LZWPreDecode function in tif_lzw.c in the (4) tiff2ps or (5) tiffdither tool, (6) NeXTDecode function in tif_next.c in the tiffmedian tool, or (7) TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool.</Note>
    </Notes>
    <CVE>CVE-2014-8127</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8127.html</URL>
        <Description>CVE-2014-8127</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1206220</URL>
        <Description>SUSE Bug 1206220</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/914890</URL>
        <Description>SUSE Bug 914890</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916925</URL>
        <Description>SUSE Bug 916925</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/942690</URL>
        <Description>SUSE Bug 942690</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969783</URL>
        <Description>SUSE Bug 969783</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibTIFF prior to 4.0.4, as used in Apple iOS before 8.4 and OS X before 10.10.4 and other products, allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted TIFF image.</Note>
    </Notes>
    <CVE>CVE-2014-8128</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8128.html</URL>
        <Description>CVE-2014-8128</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007276</URL>
        <Description>SUSE Bug 1007276</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1017690</URL>
        <Description>SUSE Bug 1017690</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1040322</URL>
        <Description>SUSE Bug 1040322</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1206220</URL>
        <Description>SUSE Bug 1206220</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/914890</URL>
        <Description>SUSE Bug 914890</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916925</URL>
        <Description>SUSE Bug 916925</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/942690</URL>
        <Description>SUSE Bug 942690</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960341</URL>
        <Description>SUSE Bug 960341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969783</URL>
        <Description>SUSE Bug 969783</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/974621</URL>
        <Description>SUSE Bug 974621</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983436</URL>
        <Description>SUSE Bug 983436</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by failure of tif_next.c to verify that the BitsPerSample value is 2, and the t2p_sample_lab_signed_to_unsigned function in tiff2pdf.c.</Note>
    </Notes>
    <CVE>CVE-2014-8129</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8129.html</URL>
        <Description>CVE-2014-8129</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1206220</URL>
        <Description>SUSE Bug 1206220</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/914890</URL>
        <Description>SUSE Bug 914890</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916925</URL>
        <Description>SUSE Bug 916925</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/942690</URL>
        <Description>SUSE Bug 942690</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969783</URL>
        <Description>SUSE Bug 969783</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image that is mishandled by the TIFFWriteScanline function in tif_write.c, as demonstrated by tiffdither.</Note>
    </Notes>
    <CVE>CVE-2014-8130</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8130.html</URL>
        <Description>CVE-2014-8130</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1206220</URL>
        <Description>SUSE Bug 1206220</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/914890</URL>
        <Description>SUSE Bug 914890</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916925</URL>
        <Description>SUSE Bug 916925</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/942690</URL>
        <Description>SUSE Bug 942690</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969783</URL>
        <Description>SUSE Bug 969783</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) putcontig8bitYCbCr21tile function in tif_getimage.c or (2) NeXTDecode function in tif_next.c in LibTIFF allows remote attackers to cause a denial of service (uninitialized memory access) via a crafted TIFF image, as demonstrated by libtiff-cvs-1.tif and libtiff-cvs-2.tif.</Note>
    </Notes>
    <CVE>CVE-2014-9655</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9655.html</URL>
        <Description>CVE-2014-9655</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1206220</URL>
        <Description>SUSE Bug 1206220</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/914890</URL>
        <Description>SUSE Bug 914890</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916925</URL>
        <Description>SUSE Bug 916925</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916927</URL>
        <Description>SUSE Bug 916927</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969783</URL>
        <Description>SUSE Bug 969783</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The NeXTDecode function in tif_next.c in LibTIFF allows remote attackers to cause a denial of service (uninitialized memory access) via a crafted TIFF image, as demonstrated by libtiff5.tif.</Note>
    </Notes>
    <CVE>CVE-2015-1547</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1547.html</URL>
        <Description>CVE-2015-1547</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1206220</URL>
        <Description>SUSE Bug 1206220</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/914890</URL>
        <Description>SUSE Bug 914890</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/916925</URL>
        <Description>SUSE Bug 916925</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The _TIFFVGetField function in tif_dir.c in libtiff 4.0.6 allows attackers to cause a denial of service (invalid memory write and crash) or possibly have unspecified other impact via crafted field data in an extension tag in a TIFF image.</Note>
    </Notes>
    <CVE>CVE-2015-7554</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7554.html</URL>
        <Description>CVE-2015-7554</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007276</URL>
        <Description>SUSE Bug 1007276</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1017690</URL>
        <Description>SUSE Bug 1017690</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1040322</URL>
        <Description>SUSE Bug 1040322</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960341</URL>
        <Description>SUSE Bug 960341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/974621</URL>
        <Description>SUSE Bug 974621</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983436</URL>
        <Description>SUSE Bug 983436</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tif_getimage.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via the SamplesPerPixel tag in a TIFF image.</Note>
    </Notes>
    <CVE>CVE-2015-8665</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8665.html</URL>
        <Description>CVE-2015-8665</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156749</URL>
        <Description>SUSE Bug 1156749</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156754</URL>
        <Description>SUSE Bug 1156754</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200195</URL>
        <Description>SUSE Bug 1200195</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The putcontig8bitCIELab function in tif_getimage.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via a packed TIFF image.</Note>
    </Notes>
    <CVE>CVE-2015-8683</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8683.html</URL>
        <Description>CVE-2015-8683</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156749</URL>
        <Description>SUSE Bug 1156749</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156754</URL>
        <Description>SUSE Bug 1156754</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200195</URL>
        <Description>SUSE Bug 1200195</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds write) via an invalid number of samples per pixel in a LogL compressed TIFF image, a different vulnerability than CVE-2015-8782.</Note>
    </Notes>
    <CVE>CVE-2015-8781</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8781.html</URL>
        <Description>CVE-2015-8781</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/964213</URL>
        <Description>SUSE Bug 964213</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/964225</URL>
        <Description>SUSE Bug 964225</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds writes) via a crafted TIFF image, a different vulnerability than CVE-2015-8781.</Note>
    </Notes>
    <CVE>CVE-2015-8782</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8782.html</URL>
        <Description>CVE-2015-8782</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/964213</URL>
        <Description>SUSE Bug 964213</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/964225</URL>
        <Description>SUSE Bug 964225</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds reads) via a crafted TIFF image.</Note>
    </Notes>
    <CVE>CVE-2015-8783</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8783.html</URL>
        <Description>CVE-2015-8783</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/964213</URL>
        <Description>SUSE Bug 964213</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/964225</URL>
        <Description>SUSE Bug 964225</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the readextension function in gif2tiff.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (application crash) via a crafted GIF file.</Note>
    </Notes>
    <CVE>CVE-2016-3186</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3186.html</URL>
        <Description>CVE-2016-3186</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/973340</URL>
        <Description>SUSE Bug 973340</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983268</URL>
        <Description>SUSE Bug 983268</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The fpAcc function in tif_predict.c in the tiff2rgba tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted TIFF image.</Note>
    </Notes>
    <CVE>CVE-2016-3622</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3622.html</URL>
        <Description>CVE-2016-3622</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/974449</URL>
        <Description>SUSE Bug 974449</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The rgb2ycbcr tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero) by setting the (1) v or (2) h parameter to 0.</Note>
    </Notes>
    <CVE>CVE-2016-3623</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3623.html</URL>
        <Description>CVE-2016-3623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/974617</URL>
        <Description>SUSE Bug 974617</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/974618</URL>
        <Description>SUSE Bug 974618</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via vectors involving the ma variable.</Note>
    </Notes>
    <CVE>CVE-2016-3658</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3658.html</URL>
        <Description>CVE-2016-3658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/974840</URL>
        <Description>SUSE Bug 974840</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer overflows in the (1) cvt_by_strip and (2) cvt_by_tile functions in the tiff2rgba tool in LibTIFF 4.0.6 and earlier, when -b mode is enabled, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image, which triggers an out-of-bounds write.</Note>
    </Notes>
    <CVE>CVE-2016-3945</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3945.html</URL>
        <Description>CVE-2016-3945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/974614</URL>
        <Description>SUSE Bug 974614</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the horizontalDifference8 function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image to tiffcp.</Note>
    </Notes>
    <CVE>CVE-2016-3990</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3990.html</URL>
        <Description>CVE-2016-3990</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/975069</URL>
        <Description>SUSE Bug 975069</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the loadImage function in the tiffcrop tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted TIFF image with zero tiles.</Note>
    </Notes>
    <CVE>CVE-2016-3991</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3991.html</URL>
        <Description>CVE-2016-3991</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/975070</URL>
        <Description>SUSE Bug 975070</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.</Note>
    </Notes>
    <CVE>CVE-2016-5314</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5314.html</URL>
        <Description>CVE-2016-5314</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984831</URL>
        <Description>SUSE Bug 984831</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/987351</URL>
        <Description>SUSE Bug 987351</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out-of-bounds read in the PixarLogCleanup function in tif_pixarlog.c in libtiff 4.0.6 and earlier allows remote attackers to crash the application by sending a crafted TIFF image to the rgb2ycbcr tool.</Note>
    </Notes>
    <CVE>CVE-2016-5316</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5316.html</URL>
        <Description>CVE-2016-5316</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984837</URL>
        <Description>SUSE Bug 984837</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the PixarLogDecode function in libtiff.so in the PixarLogDecode function in libtiff 4.0.6 and earlier, as used in GNOME nautilus, allows attackers to cause a denial of service attack (crash) via a crafted TIFF file.</Note>
    </Notes>
    <CVE>CVE-2016-5317</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5317.html</URL>
        <Description>CVE-2016-5317</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984842</URL>
        <Description>SUSE Bug 984842</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-5314.  Reason: This candidate is a reservation duplicate of CVE-2016-5314.  Notes: All CVE users should reference CVE-2016-5314 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</Note>
    </Notes>
    <CVE>CVE-2016-5320</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5320.html</URL>
        <Description>CVE-2016-5320</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007284</URL>
        <Description>SUSE Bug 1007284</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984808</URL>
        <Description>SUSE Bug 984808</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/987351</URL>
        <Description>SUSE Bug 987351</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The DumpModeDecode function in libtiff 4.0.6 and earlier allows attackers to cause a denial of service (invalid read and crash) via a crafted tiff image.</Note>
    </Notes>
    <CVE>CVE-2016-5321</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5321.html</URL>
        <Description>CVE-2016-5321</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984813</URL>
        <Description>SUSE Bug 984813</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The _TIFFFax3fillruns function in libtiff before 4.0.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted Tiff image.</Note>
    </Notes>
    <CVE>CVE-2016-5323</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5323.html</URL>
        <Description>CVE-2016-5323</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984815</URL>
        <Description>SUSE Bug 984815</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An exploitable heap-based buffer overflow exists in the handling of TIFF images in LibTIFF's TIFF2PDF tool. A crafted TIFF document can lead to a heap-based buffer overflow resulting in remote code execution. Vulnerability can be triggered via a saved TIFF file delivered by other means.</Note>
    </Notes>
    <CVE>CVE-2016-5652</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5652.html</URL>
        <Description>CVE-2016-5652</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007280</URL>
        <Description>SUSE Bug 1007280</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-5314.  Reason: This candidate is a reservation duplicate of CVE-2016-5314.  Notes: All CVE users should reference CVE-2016-5314 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</Note>
    </Notes>
    <CVE>CVE-2016-5875</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5875.html</URL>
        <Description>CVE-2016-5875</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007284</URL>
        <Description>SUSE Bug 1007284</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984809</URL>
        <Description>SUSE Bug 984809</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984831</URL>
        <Description>SUSE Bug 984831</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/987351</URL>
        <Description>SUSE Bug 987351</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tiffsplit in libtiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file, related to changing td_nstrips in TIFF_STRIPCHOP mode.</Note>
    </Notes>
    <CVE>CVE-2016-9273</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9273.html</URL>
        <Description>CVE-2016-9273</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010163</URL>
        <Description>SUSE Bug 1010163</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1017693</URL>
        <Description>SUSE Bug 1017693</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1150480</URL>
        <Description>SUSE Bug 1150480</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via crafted TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII tag values.</Note>
    </Notes>
    <CVE>CVE-2016-9297</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9297.html</URL>
        <Description>CVE-2016-9297</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010161</URL>
        <Description>SUSE Bug 1010161</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011103</URL>
        <Description>SUSE Bug 1011103</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by setting the tags TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII to values that access 0-byte arrays.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9297.</Note>
    </Notes>
    <CVE>CVE-2016-9448</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9448.html</URL>
        <Description>CVE-2016-9448</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010161</URL>
        <Description>SUSE Bug 1010161</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011103</URL>
        <Description>SUSE Bug 1011103</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The t2p_readwrite_pdf_image_tile function in LibTIFF allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a JPEG file with a TIFFTAG_JPEGTABLES of length one.</Note>
    </Notes>
    <CVE>CVE-2016-9453</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.0.7-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.0.7-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9453.html</URL>
        <Description>CVE-2016-9453</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007280</URL>
        <Description>SUSE Bug 1007280</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011107</URL>
        <Description>SUSE Bug 1011107</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
