<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libtiff-devel-32bit-4.4.0-5.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:12510-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libtiff-devel-32bit-4.4.0-5.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libtiff-devel-32bit-4.4.0-5.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-12510</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-3597/</URL>
      <Description>SUSE CVE CVE-2022-3597 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-3598/</URL>
      <Description>SUSE CVE CVE-2022-3598 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-3599/</URL>
      <Description>SUSE CVE CVE-2022-3599 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-3626/</URL>
      <Description>SUSE CVE CVE-2022-3626 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-3627/</URL>
      <Description>SUSE CVE CVE-2022-3627 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-3970/</URL>
      <Description>SUSE CVE CVE-2022-3970 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libtiff-devel-4.4.0-5.1">
      <FullProductName ProductID="libtiff-devel-4.4.0-5.1">libtiff-devel-4.4.0-5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtiff-devel-32bit-4.4.0-5.1">
      <FullProductName ProductID="libtiff-devel-32bit-4.4.0-5.1">libtiff-devel-32bit-4.4.0-5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtiff5-4.4.0-5.1">
      <FullProductName ProductID="libtiff5-4.4.0-5.1">libtiff5-4.4.0-5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtiff5-32bit-4.4.0-5.1">
      <FullProductName ProductID="libtiff5-32bit-4.4.0-5.1">libtiff5-32bit-4.4.0-5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tiff-4.4.0-5.1">
      <FullProductName ProductID="tiff-4.4.0-5.1">tiff-4.4.0-5.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libtiff-devel-4.4.0-5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libtiff-devel-4.4.0-5.1">libtiff-devel-4.4.0-5.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtiff-devel-32bit-4.4.0-5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libtiff-devel-32bit-4.4.0-5.1">libtiff-devel-32bit-4.4.0-5.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtiff5-4.4.0-5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libtiff5-4.4.0-5.1">libtiff5-4.4.0-5.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtiff5-32bit-4.4.0-5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libtiff5-32bit-4.4.0-5.1">libtiff5-32bit-4.4.0-5.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tiff-4.4.0-5.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tiff-4.4.0-5.1">tiff-4.4.0-5.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c:346 when called from extractImageSection, tools/tiffcrop.c:6826, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.</Note>
    </Notes>
    <CVE>CVE-2022-3597</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.4.0-5.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.4.0-5.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.4.0-5.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.4.0-5.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.4.0-5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-3597.html</URL>
        <Description>CVE-2022-3597</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1204641</URL>
        <Description>SUSE Bug 1204641</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1206220</URL>
        <Description>SUSE Bug 1206220</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibTIFF 4.4.0 has an out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c:3604, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit cfbb883b.</Note>
    </Notes>
    <CVE>CVE-2022-3598</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.4.0-5.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.4.0-5.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.4.0-5.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.4.0-5.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.4.0-5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-3598.html</URL>
        <Description>CVE-2022-3598</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1204642</URL>
        <Description>SUSE Bug 1204642</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1206220</URL>
        <Description>SUSE Bug 1206220</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibTIFF 4.4.0 has an out-of-bounds read in writeSingleSection in tools/tiffcrop.c:7345, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.</Note>
    </Notes>
    <CVE>CVE-2022-3599</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.4.0-5.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.4.0-5.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.4.0-5.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.4.0-5.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.4.0-5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-3599.html</URL>
        <Description>CVE-2022-3599</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1204643</URL>
        <Description>SUSE Bug 1204643</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1206220</URL>
        <Description>SUSE Bug 1206220</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c:340 when called from processCropSelections, tools/tiffcrop.c:7619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.</Note>
    </Notes>
    <CVE>CVE-2022-3626</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.4.0-5.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.4.0-5.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.4.0-5.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.4.0-5.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.4.0-5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-3626.html</URL>
        <Description>CVE-2022-3626</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1204644</URL>
        <Description>SUSE Bug 1204644</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1206220</URL>
        <Description>SUSE Bug 1206220</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c:346 when called from extractImageSection, tools/tiffcrop.c:6860, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.</Note>
    </Notes>
    <CVE>CVE-2022-3627</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.4.0-5.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.4.0-5.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.4.0-5.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.4.0-5.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.4.0-5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-3627.html</URL>
        <Description>CVE-2022-3627</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1204645</URL>
        <Description>SUSE Bug 1204645</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1206220</URL>
        <Description>SUSE Bug 1206220</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in LibTIFF. It has been classified as critical. This affects the function TIFFReadRGBATileExt of the file libtiff/tif_getimage.c. The manipulation leads to integer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 227500897dfb07fb7d27f7aa570050e62617e3be. It is recommended to apply a patch to fix this issue. The identifier VDB-213549 was assigned to this vulnerability.</Note>
    </Notes>
    <CVE>CVE-2022-3970</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libtiff-devel-32bit-4.4.0-5.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff-devel-4.4.0-5.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-32bit-4.4.0-5.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libtiff5-4.4.0-5.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tiff-4.4.0-5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-3970.html</URL>
        <Description>CVE-2022-3970</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1205392</URL>
        <Description>SUSE Bug 1205392</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208311</URL>
        <Description>SUSE Bug 1208311</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208312</URL>
        <Description>SUSE Bug 1208312</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208338</URL>
        <Description>SUSE Bug 1208338</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208655</URL>
        <Description>SUSE Bug 1208655</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1209328</URL>
        <Description>SUSE Bug 1209328</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
