Bugzilla – Bug 1182812
VUL-0: CVE-2020-35524: tiff: Heap-based buffer overflow in TIFF2PDF tool
Last modified: 2022-06-10 09:46:15 UTC
CVE-2020-35524 A flaw was found in libtiff 4.1.0. A heap-based buffer overflow exists in the handling of TIFF images in libtiff's TIFF2PDF tool. A specially crafted TIFF file can lead to arbitrary code execution. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-35524 https://access.redhat.com/security/cve/CVE-2020-35524
Tracked SLE11,12,15 as affected.
Upstream commit: https://gitlab.com/rzkn/libtiff/-/commit/7be2e452ddcf6d7abca88f41d3761e6edab72b22 References: https://bugzilla.redhat.com/show_bug.cgi?id=1932044 https://gitlab.com/libtiff/libtiff/-/merge_requests/159
submitted
openSUSE-SU-2022:0480-1: An update that fixes 8 vulnerabilities is now available. Category: security (important) Bug References: 1071031,1154365,1182808,1182809,1182811,1182812,1190312,1194539 CVE References: CVE-2017-17095,CVE-2019-17546,CVE-2020-19131,CVE-2020-35521,CVE-2020-35522,CVE-2020-35523,CVE-2020-35524,CVE-2022-22844 JIRA References: Sources used: openSUSE Leap 15.4 (src): tiff-4.0.9-45.5.1 openSUSE Leap 15.3 (src): tiff-4.0.9-45.5.1
SUSE-SU-2022:0480-1: An update that fixes 8 vulnerabilities is now available. Category: security (important) Bug References: 1071031,1154365,1182808,1182809,1182811,1182812,1190312,1194539 CVE References: CVE-2017-17095,CVE-2019-17546,CVE-2020-19131,CVE-2020-35521,CVE-2020-35522,CVE-2020-35523,CVE-2020-35524,CVE-2022-22844 JIRA References: Sources used: SUSE Manager Server 4.1 (src): tiff-4.0.9-45.5.1 SUSE Manager Retail Branch Server 4.1 (src): tiff-4.0.9-45.5.1 SUSE Manager Proxy 4.1 (src): tiff-4.0.9-45.5.1 SUSE Linux Enterprise Server for SAP 15-SP2 (src): tiff-4.0.9-45.5.1 SUSE Linux Enterprise Server for SAP 15-SP1 (src): tiff-4.0.9-45.5.1 SUSE Linux Enterprise Server for SAP 15 (src): tiff-4.0.9-45.5.1 SUSE Linux Enterprise Server 15-SP2-LTSS (src): tiff-4.0.9-45.5.1 SUSE Linux Enterprise Server 15-SP2-BCL (src): tiff-4.0.9-45.5.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): tiff-4.0.9-45.5.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): tiff-4.0.9-45.5.1 SUSE Linux Enterprise Server 15-LTSS (src): tiff-4.0.9-45.5.1 SUSE Linux Enterprise Realtime Extension 15-SP2 (src): tiff-4.0.9-45.5.1 SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4 (src): tiff-4.0.9-45.5.1 SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 (src): tiff-4.0.9-45.5.1 SUSE Linux Enterprise Module for Desktop Applications 15-SP4 (src): tiff-4.0.9-45.5.1 SUSE Linux Enterprise Module for Desktop Applications 15-SP3 (src): tiff-4.0.9-45.5.1 SUSE Linux Enterprise Module for Basesystem 15-SP4 (src): tiff-4.0.9-45.5.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): tiff-4.0.9-45.5.1 SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src): tiff-4.0.9-45.5.1 SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src): tiff-4.0.9-45.5.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): tiff-4.0.9-45.5.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): tiff-4.0.9-45.5.1 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): tiff-4.0.9-45.5.1 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): tiff-4.0.9-45.5.1 SUSE Enterprise Storage 7 (src): tiff-4.0.9-45.5.1 SUSE Enterprise Storage 6 (src): tiff-4.0.9-45.5.1 SUSE CaaS Platform 4.0 (src): tiff-4.0.9-45.5.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:14888-1: An update that fixes 6 vulnerabilities is now available. Category: security (important) Bug References: 1156749,1156754,1182808,1182809,1182811,1182812 CVE References: CVE-2015-8665,CVE-2015-8683,CVE-2020-35521,CVE-2020-35522,CVE-2020-35523,CVE-2020-35524 JIRA References: Sources used: SUSE Linux Enterprise Server 11-SP4-LTSS (src): tiff-3.8.2-141.169.34.1 SUSE Linux Enterprise Point of Sale 11-SP3 (src): tiff-3.8.2-141.169.34.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): tiff-3.8.2-141.169.34.1 SUSE Linux Enterprise Debuginfo 11-SP3 (src): tiff-3.8.2-141.169.34.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:0496-1: An update that fixes 8 vulnerabilities is now available. Category: security (important) Bug References: 1071031,1154365,1182808,1182809,1182811,1182812,1190312,1194539 CVE References: CVE-2017-17095,CVE-2019-17546,CVE-2020-19131,CVE-2020-35521,CVE-2020-35522,CVE-2020-35523,CVE-2020-35524,CVE-2022-22844 JIRA References: Sources used: SUSE OpenStack Cloud Crowbar 9 (src): tiff-4.0.9-44.45.1 SUSE OpenStack Cloud Crowbar 8 (src): tiff-4.0.9-44.45.1 SUSE OpenStack Cloud 9 (src): tiff-4.0.9-44.45.1 SUSE OpenStack Cloud 8 (src): tiff-4.0.9-44.45.1 SUSE Linux Enterprise Software Development Kit 12-SP5 (src): tiff-4.0.9-44.45.1 SUSE Linux Enterprise Server for SAP 12-SP4 (src): tiff-4.0.9-44.45.1 SUSE Linux Enterprise Server for SAP 12-SP3 (src): tiff-4.0.9-44.45.1 SUSE Linux Enterprise Server 12-SP5 (src): tiff-4.0.9-44.45.1 SUSE Linux Enterprise Server 12-SP4-LTSS (src): tiff-4.0.9-44.45.1 SUSE Linux Enterprise Server 12-SP3-LTSS (src): tiff-4.0.9-44.45.1 SUSE Linux Enterprise Server 12-SP3-BCL (src): tiff-4.0.9-44.45.1 SUSE Linux Enterprise Server 12-SP2-BCL (src): tiff-4.0.9-44.45.1 HPE Helion Openstack 8 (src): tiff-4.0.9-44.45.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Done, closing.