Bug 1190312 (CVE-2020-19131) - VUL-0: CVE-2020-19131: tiff: Buffer Overflow in LibTiff v4.0.10 allows attackers to cause a denial of service via the "invertImage()" function in the component "tiffcrop".
Summary: VUL-0: CVE-2020-19131: tiff: Buffer Overflow in LibTiff v4.0.10 allows attack...
Status: RESOLVED FIXED
Alias: CVE-2020-19131
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/309245/
Whiteboard: CVSSv3.1:SUSE:CVE-2020-19131:5.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2021-09-08 15:17 UTC by Gabriele Sonnu
Modified: 2024-05-17 12:12 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 1 Gabriele Sonnu 2021-09-08 15:18:55 UTC
Affected packages:

- SUSE:SLE-12:Update/tiff  4.0.9
- SUSE:SLE-15:Update/tiff  4.0.9

Upstream patch:

https://gitlab.com/libtiff/libtiff/-/merge_requests/61/diffs
Comment 3 Michael Vetter 2022-02-02 11:49:24 UTC
submitted
Comment 4 Swamp Workflow Management 2022-02-17 17:19:15 UTC
openSUSE-SU-2022:0480-1: An update that fixes 8 vulnerabilities is now available.

Category: security (important)
Bug References: 1071031,1154365,1182808,1182809,1182811,1182812,1190312,1194539
CVE References: CVE-2017-17095,CVE-2019-17546,CVE-2020-19131,CVE-2020-35521,CVE-2020-35522,CVE-2020-35523,CVE-2020-35524,CVE-2022-22844
JIRA References: 
Sources used:
openSUSE Leap 15.4 (src):    tiff-4.0.9-45.5.1
openSUSE Leap 15.3 (src):    tiff-4.0.9-45.5.1
Comment 5 Swamp Workflow Management 2022-02-17 17:23:00 UTC
SUSE-SU-2022:0480-1: An update that fixes 8 vulnerabilities is now available.

Category: security (important)
Bug References: 1071031,1154365,1182808,1182809,1182811,1182812,1190312,1194539
CVE References: CVE-2017-17095,CVE-2019-17546,CVE-2020-19131,CVE-2020-35521,CVE-2020-35522,CVE-2020-35523,CVE-2020-35524,CVE-2022-22844
JIRA References: 
Sources used:
SUSE Manager Server 4.1 (src):    tiff-4.0.9-45.5.1
SUSE Manager Retail Branch Server 4.1 (src):    tiff-4.0.9-45.5.1
SUSE Manager Proxy 4.1 (src):    tiff-4.0.9-45.5.1
SUSE Linux Enterprise Server for SAP 15-SP2 (src):    tiff-4.0.9-45.5.1
SUSE Linux Enterprise Server for SAP 15-SP1 (src):    tiff-4.0.9-45.5.1
SUSE Linux Enterprise Server for SAP 15 (src):    tiff-4.0.9-45.5.1
SUSE Linux Enterprise Server 15-SP2-LTSS (src):    tiff-4.0.9-45.5.1
SUSE Linux Enterprise Server 15-SP2-BCL (src):    tiff-4.0.9-45.5.1
SUSE Linux Enterprise Server 15-SP1-LTSS (src):    tiff-4.0.9-45.5.1
SUSE Linux Enterprise Server 15-SP1-BCL (src):    tiff-4.0.9-45.5.1
SUSE Linux Enterprise Server 15-LTSS (src):    tiff-4.0.9-45.5.1
SUSE Linux Enterprise Realtime Extension 15-SP2 (src):    tiff-4.0.9-45.5.1
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4 (src):    tiff-4.0.9-45.5.1
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 (src):    tiff-4.0.9-45.5.1
SUSE Linux Enterprise Module for Desktop Applications 15-SP4 (src):    tiff-4.0.9-45.5.1
SUSE Linux Enterprise Module for Desktop Applications 15-SP3 (src):    tiff-4.0.9-45.5.1
SUSE Linux Enterprise Module for Basesystem 15-SP4 (src):    tiff-4.0.9-45.5.1
SUSE Linux Enterprise Module for Basesystem 15-SP3 (src):    tiff-4.0.9-45.5.1
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src):    tiff-4.0.9-45.5.1
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src):    tiff-4.0.9-45.5.1
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src):    tiff-4.0.9-45.5.1
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src):    tiff-4.0.9-45.5.1
SUSE Linux Enterprise High Performance Computing 15-LTSS (src):    tiff-4.0.9-45.5.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS (src):    tiff-4.0.9-45.5.1
SUSE Enterprise Storage 7 (src):    tiff-4.0.9-45.5.1
SUSE Enterprise Storage 6 (src):    tiff-4.0.9-45.5.1
SUSE CaaS Platform 4.0 (src):    tiff-4.0.9-45.5.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 6 Swamp Workflow Management 2022-02-18 14:35:06 UTC
SUSE-SU-2022:0496-1: An update that fixes 8 vulnerabilities is now available.

Category: security (important)
Bug References: 1071031,1154365,1182808,1182809,1182811,1182812,1190312,1194539
CVE References: CVE-2017-17095,CVE-2019-17546,CVE-2020-19131,CVE-2020-35521,CVE-2020-35522,CVE-2020-35523,CVE-2020-35524,CVE-2022-22844
JIRA References: 
Sources used:
SUSE OpenStack Cloud Crowbar 9 (src):    tiff-4.0.9-44.45.1
SUSE OpenStack Cloud Crowbar 8 (src):    tiff-4.0.9-44.45.1
SUSE OpenStack Cloud 9 (src):    tiff-4.0.9-44.45.1
SUSE OpenStack Cloud 8 (src):    tiff-4.0.9-44.45.1
SUSE Linux Enterprise Software Development Kit 12-SP5 (src):    tiff-4.0.9-44.45.1
SUSE Linux Enterprise Server for SAP 12-SP4 (src):    tiff-4.0.9-44.45.1
SUSE Linux Enterprise Server for SAP 12-SP3 (src):    tiff-4.0.9-44.45.1
SUSE Linux Enterprise Server 12-SP5 (src):    tiff-4.0.9-44.45.1
SUSE Linux Enterprise Server 12-SP4-LTSS (src):    tiff-4.0.9-44.45.1
SUSE Linux Enterprise Server 12-SP3-LTSS (src):    tiff-4.0.9-44.45.1
SUSE Linux Enterprise Server 12-SP3-BCL (src):    tiff-4.0.9-44.45.1
SUSE Linux Enterprise Server 12-SP2-BCL (src):    tiff-4.0.9-44.45.1
HPE Helion Openstack 8 (src):    tiff-4.0.9-44.45.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 OBSbugzilla Bot 2023-10-30 19:35:28 UTC
This is an autogenerated message for OBS integration:
This bug (1190312) was mentioned in
https://build.opensuse.org/request/show/1121286 Factory / tiff
Comment 10 Andrea Mattiazzo 2024-05-17 12:12:13 UTC
All done, closing.