Bugzilla – Bug 1212535
VUL-0: CVE-2023-3316: tiff: null pointer dereference in TIFFClose()
Last modified: 2023-11-06 12:30:23 UTC
CVE-2023-3316 A NULL pointer dereference in TIFFClose() is caused by a failure to open an output file (non-existent path or a path that requires permissions like /dev/null) while specifying zones. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3316 https://bugzilla.redhat.com/show_bug.cgi?id=2216080 https://www.cve.org/CVERecord?id=CVE-2023-3316 https://research.jfrog.com/vulnerabilities/libtiff-nullderef-dos-xray-522144/
Affected: - SUSE:ALP:Source:Standard:1.0/tiff 4.5.0 - SUSE:SLE-12:Update/tiff 4.0.9 - SUSE:SLE-15:Update/tiff 4.0.9 - openSUSE:Factory/tiff 4.5.0 (please note: the ALP codestream currently takes regular submissions instead of maintenance submissions)
Upstream issue: https://gitlab.com/libtiff/libtiff/-/issues/515 Upstream PR: https://gitlab.com/libtiff/libtiff/-/merge_requests/468/diffs Patch tiff-CVE-2023-3316.patch in home:mvetter:branches:OBS_Maintained:tiff. Will fix a couple of more and then submit.
SR accepted. Factory and ALP have tiff 4.6.0 by now.
SUSE-SU-2023:4371-1: An update that solves nine vulnerabilities can now be installed. Category: security (moderate) Bug References: 1212535, 1212881, 1212883, 1212888, 1213273, 1213274, 1213589, 1213590, 1214574 CVE References: CVE-2020-18768, CVE-2023-25433, CVE-2023-26966, CVE-2023-2908, CVE-2023-3316, CVE-2023-3576, CVE-2023-3618, CVE-2023-38288, CVE-2023-38289 Sources used: SUSE Linux Enterprise Software Development Kit 12 SP5 (src): tiff-4.0.9-44.71.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): tiff-4.0.9-44.71.1 SUSE Linux Enterprise Server 12 SP5 (src): tiff-4.0.9-44.71.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): tiff-4.0.9-44.71.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4370-1: An update that solves nine vulnerabilities can now be installed. Category: security (moderate) Bug References: 1212535, 1212881, 1212883, 1212888, 1213273, 1213274, 1213589, 1213590, 1214574 CVE References: CVE-2020-18768, CVE-2023-25433, CVE-2023-26966, CVE-2023-2908, CVE-2023-3316, CVE-2023-3576, CVE-2023-3618, CVE-2023-38288, CVE-2023-38289 Sources used: SUSE Linux Enterprise Micro 5.2 (src): tiff-4.0.9-150000.45.32.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): tiff-4.0.9-150000.45.32.1 openSUSE Leap Micro 5.3 (src): tiff-4.0.9-150000.45.32.1 openSUSE Leap Micro 5.4 (src): tiff-4.0.9-150000.45.32.1 openSUSE Leap 15.4 (src): tiff-4.0.9-150000.45.32.1 openSUSE Leap 15.5 (src): tiff-4.0.9-150000.45.32.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): tiff-4.0.9-150000.45.32.1 SUSE Linux Enterprise Micro 5.3 (src): tiff-4.0.9-150000.45.32.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): tiff-4.0.9-150000.45.32.1 SUSE Linux Enterprise Micro 5.4 (src): tiff-4.0.9-150000.45.32.1 SUSE Linux Enterprise Micro 5.5 (src): tiff-4.0.9-150000.45.32.1 Basesystem Module 15-SP4 (src): tiff-4.0.9-150000.45.32.1 Basesystem Module 15-SP5 (src): tiff-4.0.9-150000.45.32.1 SUSE Package Hub 15 15-SP4 (src): tiff-4.0.9-150000.45.32.1 SUSE Package Hub 15 15-SP5 (src): tiff-4.0.9-150000.45.32.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.