<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libtiff-devel-32bit-4.3.0-1.3 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11461</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libtiff-devel-32bit-4.3.0-1.3 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libtiff-devel-32bit-4.3.0-1.3 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11461</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:11461</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-0405/</URL>
      <Description>SUSE CVE CVE-2006-0405 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-2656/</URL>
      <Description>SUSE CVE CVE-2006-2656 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-1586/</URL>
      <Description>SUSE CVE CVE-2008-1586 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-2327/</URL>
      <Description>SUSE CVE CVE-2008-2327 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10095/</URL>
      <Description>SUSE CVE CVE-2016-10095 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10266/</URL>
      <Description>SUSE CVE CVE-2016-10266 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10267/</URL>
      <Description>SUSE CVE CVE-2016-10267 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10268/</URL>
      <Description>SUSE CVE CVE-2016-10268 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10269/</URL>
      <Description>SUSE CVE CVE-2016-10269 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10270/</URL>
      <Description>SUSE CVE CVE-2016-10270 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10271/</URL>
      <Description>SUSE CVE CVE-2016-10271 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10272/</URL>
      <Description>SUSE CVE CVE-2016-10272 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10371/</URL>
      <Description>SUSE CVE CVE-2016-10371 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5318/</URL>
      <Description>SUSE CVE CVE-2016-5318 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9538/</URL>
      <Description>SUSE CVE CVE-2016-9538 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-11613/</URL>
      <Description>SUSE CVE CVE-2017-11613 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-16232/</URL>
      <Description>SUSE CVE CVE-2017-16232 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-18013/</URL>
      <Description>SUSE CVE CVE-2017-18013 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5225/</URL>
      <Description>SUSE CVE CVE-2017-5225 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7592/</URL>
      <Description>SUSE CVE CVE-2017-7592 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7593/</URL>
      <Description>SUSE CVE CVE-2017-7593 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7594/</URL>
      <Description>SUSE CVE CVE-2017-7594 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7595/</URL>
      <Description>SUSE CVE CVE-2017-7595 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7596/</URL>
      <Description>SUSE CVE CVE-2017-7596 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7598/</URL>
      <Description>SUSE CVE CVE-2017-7598 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7599/</URL>
      <Description>SUSE CVE CVE-2017-7599 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7601/</URL>
      <Description>SUSE CVE CVE-2017-7601 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7602/</URL>
      <Description>SUSE CVE CVE-2017-7602 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9403/</URL>
      <Description>SUSE CVE CVE-2017-9403 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9404/</URL>
      <Description>SUSE CVE CVE-2017-9404 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9935/</URL>
      <Description>SUSE CVE CVE-2017-9935 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9936/</URL>
      <Description>SUSE CVE CVE-2017-9936 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-10779/</URL>
      <Description>SUSE CVE CVE-2018-10779 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-10963/</URL>
      <Description>SUSE CVE CVE-2018-10963 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12900/</URL>
      <Description>SUSE CVE CVE-2018-12900 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16335/</URL>
      <Description>SUSE CVE CVE-2018-16335 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-17000/</URL>
      <Description>SUSE CVE CVE-2018-17000 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-17100/</URL>
      <Description>SUSE CVE CVE-2018-17100 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-17101/</URL>
      <Description>SUSE CVE CVE-2018-17101 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-17795/</URL>
      <Description>SUSE CVE CVE-2018-17795 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-18557/</URL>
      <Description>SUSE CVE CVE-2018-18557 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-18661/</URL>
      <Description>SUSE CVE CVE-2018-18661 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19210/</URL>
      <Description>SUSE CVE CVE-2018-19210 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5784/</URL>
      <Description>SUSE CVE CVE-2018-5784 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7456/</URL>
      <Description>SUSE CVE CVE-2018-7456 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-8905/</URL>
      <Description>SUSE CVE CVE-2018-8905 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-6128/</URL>
      <Description>SUSE CVE CVE-2019-6128 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-7663/</URL>
      <Description>SUSE CVE CVE-2019-7663 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libtiff-devel-4.3.0-1.3">
      <FullProductName ProductID="libtiff-devel-4.3.0-1.3">libtiff-devel-4.3.0-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtiff-devel-32bit-4.3.0-1.3">
      <FullProductName ProductID="libtiff-devel-32bit-4.3.0-1.3">libtiff-devel-32bit-4.3.0-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtiff5-4.3.0-1.3">
      <FullProductName ProductID="libtiff5-4.3.0-1.3">libtiff5-4.3.0-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtiff5-32bit-4.3.0-1.3">
      <FullProductName ProductID="libtiff5-32bit-4.3.0-1.3">libtiff5-32bit-4.3.0-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tiff-4.3.0-1.3">
      <FullProductName ProductID="tiff-4.3.0-1.3">tiff-4.3.0-1.3</FullProductName>
    </Branch>
    <Relationship ProductReference="libtiff-devel-4.3.0-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3">libtiff-devel-4.3.0-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtiff-devel-32bit-4.3.0-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3">libtiff-devel-32bit-4.3.0-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtiff5-4.3.0-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libtiff5-4.3.0-1.3">libtiff5-4.3.0-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtiff5-32bit-4.3.0-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3">libtiff5-32bit-4.3.0-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tiff-4.3.0-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tiff-4.3.0-1.3">tiff-4.3.0-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TIFFFetchShortPair function in tif_dirread.c in libtiff 3.8.0 allows remote attackers to cause a denial of service (application crash) via a crafted TIFF image that triggers a NULL pointer dereference, possibly due to changes in type declarations and/or the TIFFVSetField function.</Note>
    </Notes>
    <CVE>CVE-2006-0405</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-0405.html</URL>
        <Description>CVE-2006-0405</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/145757</URL>
        <Description>SUSE Bug 145757</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/165237</URL>
        <Description>SUSE Bug 165237</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the tiffsplit command in libtiff 3.8.2 and earlier might might allow attackers to execute arbitrary code via a long filename. NOTE: tiffsplit is not setuid. If there is not a common scenario under which tiffsplit is called with attacker-controlled command line arguments, then perhaps this issue should not be included in CVE.</Note>
    </Notes>
    <CVE>CVE-2006-2656</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-2656.html</URL>
        <Description>CVE-2006-2656</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/179051</URL>
        <Description>SUSE Bug 179051</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageIO in Apple iPhone OS 1.0 through 2.1 and iPhone OS for iPod touch 1.1 through 2.1 allow remote attackers to cause a denial of service (memory consumption and device reset) via a crafted TIFF image.</Note>
    </Notes>
    <CVE>CVE-2008-1586</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-1586.html</URL>
        <Description>CVE-2008-1586</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/444079</URL>
        <Description>SUSE Bug 444079</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple buffer underflows in the (1) LZWDecode, (2) LZWDecodeCompat, and (3) LZWDecodeVector functions in tif_lzw.c in the LZW decoder in LibTIFF 3.8.2 and earlier allow context-dependent attackers to execute arbitrary code via a crafted TIFF file, related to improper handling of the CODE_CLEAR code.</Note>
    </Notes>
    <CVE>CVE-2008-2327</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-2327.html</URL>
        <Description>CVE-2008-2327</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/414946</URL>
        <Description>SUSE Bug 414946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/518698</URL>
        <Description>SUSE Bug 518698</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the _TIFFVGetField function in tif_dir.c in LibTIFF 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7 and 4.0.8 allows remote attackers to cause a denial of service (crash) via a crafted TIFF file.</Note>
    </Notes>
    <CVE>CVE-2016-10095</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10095.html</URL>
        <Description>CVE-2016-10095</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1017690</URL>
        <Description>SUSE Bug 1017690</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960341</URL>
        <Description>SUSE Bug 960341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983436</URL>
        <Description>SUSE Bug 983436</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_read.c:351:22.</Note>
    </Notes>
    <CVE>CVE-2016-10266</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10266.html</URL>
        <Description>CVE-2016-10266</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1017694</URL>
        <Description>SUSE Bug 1017694</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1031263</URL>
        <Description>SUSE Bug 1031263</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_ojpeg.c:816:8.</Note>
    </Notes>
    <CVE>CVE-2016-10267</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10267.html</URL>
        <Description>CVE-2016-10267</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1017694</URL>
        <Description>SUSE Bug 1017694</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1031262</URL>
        <Description>SUSE Bug 1031262</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tools/tiffcp.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (integer underflow and heap-based buffer under-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 78490" and libtiff/tif_unix.c:115:23.</Note>
    </Notes>
    <CVE>CVE-2016-10268</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10268.html</URL>
        <Description>CVE-2016-10268</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1017693</URL>
        <Description>SUSE Bug 1017693</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1031255</URL>
        <Description>SUSE Bug 1031255</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibTIFF 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6 and 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 512" and libtiff/tif_unix.c:340:2.</Note>
    </Notes>
    <CVE>CVE-2016-10269</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10269.html</URL>
        <Description>CVE-2016-10269</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1017693</URL>
        <Description>SUSE Bug 1017693</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1031254</URL>
        <Description>SUSE Bug 1031254</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 8" and libtiff/tif_read.c:523:22.</Note>
    </Notes>
    <CVE>CVE-2016-10270</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10270.html</URL>
        <Description>CVE-2016-10270</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1031250</URL>
        <Description>SUSE Bug 1031250</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tools/tiffcrop.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read and buffer overflow) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 1" and libtiff/tif_fax3.c:413:13.</Note>
    </Notes>
    <CVE>CVE-2016-10271</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10271.html</URL>
        <Description>CVE-2016-10271</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1031249</URL>
        <Description>SUSE Bug 1031249</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted TIFF image, related to "WRITE of size 2048" and libtiff/tif_next.c:64:9.</Note>
    </Notes>
    <CVE>CVE-2016-10272</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10272.html</URL>
        <Description>CVE-2016-10272</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1031247</URL>
        <Description>SUSE Bug 1031247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TIFFWriteDirectoryTagCheckedRational function in tif_dirwrite.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted TIFF file.</Note>
    </Notes>
    <CVE>CVE-2016-10371</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10371.html</URL>
        <Description>CVE-2016-10371</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038438</URL>
        <Description>SUSE Bug 1038438</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the _TIFFVGetField function in libtiff 4.0.6 and earlier allows remote attackers to crash the application via a crafted tiff.</Note>
    </Notes>
    <CVE>CVE-2016-5318</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5318.html</URL>
        <Description>CVE-2016-5318</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007276</URL>
        <Description>SUSE Bug 1007276</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1017690</URL>
        <Description>SUSE Bug 1017690</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1040322</URL>
        <Description>SUSE Bug 1040322</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960341</URL>
        <Description>SUSE Bug 960341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/974621</URL>
        <Description>SUSE Bug 974621</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983436</URL>
        <Description>SUSE Bug 983436</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tools/tiffcrop.c in libtiff 4.0.6 reads an undefined buffer in readContigStripsIntoBuffer() because of a uint16 integer overflow. Reported as MSVR 35100.</Note>
    </Notes>
    <CVE>CVE-2016-9538</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9538.html</URL>
        <Description>CVE-2016-9538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1004519</URL>
        <Description>SUSE Bug 1004519</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011841</URL>
        <Description>SUSE Bug 1011841</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In LibTIFF 4.0.8, there is a denial of service vulnerability in the TIFFOpen function. A crafted input will lead to a denial of service attack. During the TIFFOpen process, td_imagelength is not checked. The value of td_imagelength can be directly controlled by an input file. In the ChopUpSingleUncompressedStrip function, the _TIFFCheckMalloc function is called based on td_imagelength. If we set the value of td_imagelength close to the amount of system memory, it will hang the system or trigger the OOM killer.</Note>
    </Notes>
    <CVE>CVE-2017-11613</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11613.html</URL>
        <Description>CVE-2017-11613</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082332</URL>
        <Description>SUSE Bug 1082332</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106853</URL>
        <Description>SUSE Bug 1106853</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** DISPUTED ** LibTIFF 4.0.8 has multiple memory leak vulnerabilities, which allow attackers to cause a denial of service (memory consumption), as demonstrated by tif_open.c, tif_lzw.c, and tif_aux.c. NOTE: Third parties were unable to reproduce the issue.</Note>
    </Notes>
    <CVE>CVE-2017-16232</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16232.html</URL>
        <Description>CVE-2017-16232</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1069213</URL>
        <Description>SUSE Bug 1069213</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In LibTIFF 4.0.9, there is a Null-Pointer Dereference in the tif_print.c TIFFPrintDirectory function, as demonstrated by a tiffinfo crash.</Note>
    </Notes>
    <CVE>CVE-2017-18013</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-18013.html</URL>
        <Description>CVE-2017-18013</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074317</URL>
        <Description>SUSE Bug 1074317</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082825</URL>
        <Description>SUSE Bug 1082825</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the tools/tiffcp resulting in DoS or code execution via a crafted BitsPerSample value.</Note>
    </Notes>
    <CVE>CVE-2017-5225</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5225.html</URL>
        <Description>CVE-2017-5225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1019611</URL>
        <Description>SUSE Bug 1019611</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The putagreytile function in tif_getimage.c in LibTIFF 4.0.7 has a left-shift undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.</Note>
    </Notes>
    <CVE>CVE-2017-7592</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7592.html</URL>
        <Description>CVE-2017-7592</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033131</URL>
        <Description>SUSE Bug 1033131</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tif_read.c in LibTIFF 4.0.7 does not ensure that tif_rawdata is properly initialized, which might allow remote attackers to obtain sensitive information from process memory via a crafted image.</Note>
    </Notes>
    <CVE>CVE-2017-7593</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7593.html</URL>
        <Description>CVE-2017-7593</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033129</URL>
        <Description>SUSE Bug 1033129</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The OJPEGReadHeaderInfoSecTablesDcTable function in tif_ojpeg.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (memory leak) via a crafted image.</Note>
    </Notes>
    <CVE>CVE-2017-7594</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7594.html</URL>
        <Description>CVE-2017-7594</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033128</URL>
        <Description>SUSE Bug 1033128</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The JPEGSetupEncode function in tiff_jpeg.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image.</Note>
    </Notes>
    <CVE>CVE-2017-7595</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7595.html</URL>
        <Description>CVE-2017-7595</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033111</URL>
        <Description>SUSE Bug 1033111</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033127</URL>
        <Description>SUSE Bug 1033127</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibTIFF 4.0.7 has an "outside the range of representable values of type float" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.</Note>
    </Notes>
    <CVE>CVE-2017-7596</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7596.html</URL>
        <Description>CVE-2017-7596</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033112</URL>
        <Description>SUSE Bug 1033112</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033113</URL>
        <Description>SUSE Bug 1033113</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033120</URL>
        <Description>SUSE Bug 1033120</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033126</URL>
        <Description>SUSE Bug 1033126</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tif_dirread.c in LibTIFF 4.0.7 might allow remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image.</Note>
    </Notes>
    <CVE>CVE-2017-7598</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7598.html</URL>
        <Description>CVE-2017-7598</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033118</URL>
        <Description>SUSE Bug 1033118</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibTIFF 4.0.7 has an "outside the range of representable values of type short" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.</Note>
    </Notes>
    <CVE>CVE-2017-7599</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7599.html</URL>
        <Description>CVE-2017-7599</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033112</URL>
        <Description>SUSE Bug 1033112</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033113</URL>
        <Description>SUSE Bug 1033113</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033120</URL>
        <Description>SUSE Bug 1033120</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033126</URL>
        <Description>SUSE Bug 1033126</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibTIFF 4.0.7 has a "shift exponent too large for 64-bit type long" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.</Note>
    </Notes>
    <CVE>CVE-2017-7601</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7601.html</URL>
        <Description>CVE-2017-7601</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033111</URL>
        <Description>SUSE Bug 1033111</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033127</URL>
        <Description>SUSE Bug 1033127</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibTIFF 4.0.7 has a signed integer overflow, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.</Note>
    </Notes>
    <CVE>CVE-2017-7602</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7602.html</URL>
        <Description>CVE-2017-7602</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033109</URL>
        <Description>SUSE Bug 1033109</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In LibTIFF 4.0.7, a memory leak vulnerability was found in the function TIFFReadDirEntryLong8Array in tif_dirread.c, which allows attackers to cause a denial of service via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-9403</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9403.html</URL>
        <Description>CVE-2017-9403</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042805</URL>
        <Description>SUSE Bug 1042805</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1045688</URL>
        <Description>SUSE Bug 1045688</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In LibTIFF 4.0.7, a memory leak vulnerability was found in the function OJPEGReadHeaderInfoSecTablesQTable in tif_ojpeg.c, which allows attackers to cause a denial of service via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-9404</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9404.html</URL>
        <Description>CVE-2017-9404</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042804</URL>
        <Description>SUSE Bug 1042804</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In LibTIFF 4.0.8, there is a heap-based buffer overflow in the t2p_write_pdf function in tools/tiff2pdf.c. This heap overflow could lead to different damages. For example, a crafted TIFF document can lead to an out-of-bounds read in TIFFCleanup, an invalid free in TIFFClose or t2p_free, memory corruption in t2p_readwrite_pdf_image, or a double free in t2p_free. Given these possibilities, it probably could cause arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2017-9935</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9935.html</URL>
        <Description>CVE-2017-9935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1046077</URL>
        <Description>SUSE Bug 1046077</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074318</URL>
        <Description>SUSE Bug 1074318</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108606</URL>
        <Description>SUSE Bug 1108606</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110358</URL>
        <Description>SUSE Bug 1110358</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In LibTIFF 4.0.8, there is a memory leak in tif_jbig.c. A crafted TIFF document can lead to a memory leak resulting in a remote denial of service attack.</Note>
    </Notes>
    <CVE>CVE-2017-9936</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9936.html</URL>
        <Description>CVE-2017-9936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1046073</URL>
        <Description>SUSE Bug 1046073</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">TIFFWriteScanline in tif_write.c in LibTIFF 3.8.2 has a heap-based buffer over-read, as demonstrated by bmp2tiff.</Note>
    </Notes>
    <CVE>CVE-2018-10779</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10779.html</URL>
        <Description>CVE-2018-10779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092480</URL>
        <Description>SUSE Bug 1092480</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TIFFWriteDirectorySec() function in tif_dirwrite.c in LibTIFF through 4.0.9 allows remote attackers to cause a denial of service (assertion failure and application crash) via a crafted file, a different vulnerability than CVE-2017-13726.</Note>
    </Notes>
    <CVE>CVE-2018-10963</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10963.html</URL>
        <Description>CVE-2018-10963</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092949</URL>
        <Description>SUSE Bug 1092949</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the cpSeparateBufToContigBuf function in tiffcp.c in LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0beta7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 allows remote attackers to cause a denial of service (crash) or possibly have unspecified other impact via a crafted TIFF file.</Note>
    </Notes>
    <CVE>CVE-2018-12900</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12900.html</URL>
        <Description>CVE-2018-12900</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1099257</URL>
        <Description>SUSE Bug 1099257</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125113</URL>
        <Description>SUSE Bug 1125113</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1150480</URL>
        <Description>SUSE Bug 1150480</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">newoffsets handling in ChopUpSingleUncompressedStrip in tif_dirread.c in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf. This is a different vulnerability than CVE-2018-15209.</Note>
    </Notes>
    <CVE>CVE-2018-16335</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16335.html</URL>
        <Description>CVE-2018-16335</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106853</URL>
        <Description>SUSE Bug 1106853</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A NULL pointer dereference in the function _TIFFmemcmp at tif_unix.c (called from TIFFWriteDirectoryTagTransferfunction) in LibTIFF 4.0.9 allows an attacker to cause a denial-of-service through a crafted tiff file. This vulnerability can be triggered by the executable tiffcp.</Note>
    </Notes>
    <CVE>CVE-2018-17000</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-17000.html</URL>
        <Description>CVE-2018-17000</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108606</URL>
        <Description>SUSE Bug 1108606</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115717</URL>
        <Description>SUSE Bug 1115717</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125113</URL>
        <Description>SUSE Bug 1125113</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in LibTIFF 4.0.9. There is a int32 overflow in multiply_ms in tools/ppm2tiff.c, which can cause a denial of service (crash) or possibly have unspecified other impact via a crafted image file.</Note>
    </Notes>
    <CVE>CVE-2018-17100</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-17100.html</URL>
        <Description>CVE-2018-17100</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108637</URL>
        <Description>SUSE Bug 1108637</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in LibTIFF 4.0.9. There are two out-of-bounds writes in cpTags in tools/tiff2bw.c and tools/pal2rgb.c, which can cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image file.</Note>
    </Notes>
    <CVE>CVE-2018-17101</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-17101.html</URL>
        <Description>CVE-2018-17101</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108627</URL>
        <Description>SUSE Bug 1108627</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The function t2p_write_pdf in tiff2pdf.c in LibTIFF 4.0.9 and earlier allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, a similar issue to CVE-2017-9935.</Note>
    </Notes>
    <CVE>CVE-2018-17795</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-17795.html</URL>
        <Description>CVE-2018-17795</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1046077</URL>
        <Description>SUSE Bug 1046077</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110358</URL>
        <Description>SUSE Bug 1110358</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 (with JBIG enabled) decodes arbitrarily-sized JBIG into a buffer, ignoring the buffer size, which leads to a tif_jbig.c JBIGDecode out-of-bounds write.</Note>
    </Notes>
    <CVE>CVE-2018-18557</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18557.html</URL>
        <Description>CVE-2018-18557</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1113094</URL>
        <Description>SUSE Bug 1113094</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in LibTIFF 4.0.9. There is a NULL pointer dereference in the function LZWDecode in the file tif_lzw.c.</Note>
    </Notes>
    <CVE>CVE-2018-18661</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18661.html</URL>
        <Description>CVE-2018-18661</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1113672</URL>
        <Description>SUSE Bug 1113672</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In LibTIFF 4.0.9, there is a NULL pointer dereference in the TIFFWriteDirectorySec function in tif_dirwrite.c that will lead to a denial of service attack, as demonstrated by tiffset.</Note>
    </Notes>
    <CVE>CVE-2018-19210</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19210.html</URL>
        <Description>CVE-2018-19210</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1108606</URL>
        <Description>SUSE Bug 1108606</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115717</URL>
        <Description>SUSE Bug 1115717</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In LibTIFF 4.0.9, there is an uncontrolled resource consumption in the TIFFSetDirectory function of tif_dir.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted tif file. This occurs because the declared number of directory entries is not validated against the actual number of directory entries.</Note>
    </Notes>
    <CVE>CVE-2018-5784</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5784.html</URL>
        <Description>CVE-2018-5784</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1081690</URL>
        <Description>SUSE Bug 1081690</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A NULL Pointer Dereference occurs in the function TIFFPrintDirectory in tif_print.c in LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 when using the tiffinfo tool to print crafted TIFF information, a different vulnerability than CVE-2017-18013. (This affects an earlier part of the TIFFPrintDirectory function that was not addressed by the CVE-2017-18013 patch.)</Note>
    </Notes>
    <CVE>CVE-2018-7456</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7456.html</URL>
        <Description>CVE-2018-7456</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074317</URL>
        <Description>SUSE Bug 1074317</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082825</URL>
        <Description>SUSE Bug 1082825</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In LibTIFF 4.0.9, a heap-based buffer overflow occurs in the function LZWDecodeCompat in tif_lzw.c via a crafted TIFF file, as demonstrated by tiff2ps.</Note>
    </Notes>
    <CVE>CVE-2018-8905</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-8905.html</URL>
        <Description>CVE-2018-8905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1086408</URL>
        <Description>SUSE Bug 1086408</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TIFFFdOpen function in tif_unix.c in LibTIFF 4.0.10 has a memory leak, as demonstrated by pal2rgb.</Note>
    </Notes>
    <CVE>CVE-2019-6128</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6128.html</URL>
        <Description>CVE-2019-6128</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121626</URL>
        <Description>SUSE Bug 1121626</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1153715</URL>
        <Description>SUSE Bug 1153715</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An Invalid Address dereference was discovered in TIFFWriteDirectoryTagTransferfunction in libtiff/tif_dirwrite.c in LibTIFF 4.0.10, affecting the cpSeparateBufToContigBuf function in tiffcp.c. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted tiff file. This is different from CVE-2018-12900.</Note>
    </Notes>
    <CVE>CVE-2019-7663</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.3.0-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.3.0-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-7663.html</URL>
        <Description>CVE-2019-7663</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125113</URL>
        <Description>SUSE Bug 1125113</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
