# Security update for tiff Announcement ID: SUSE-SU-2025:0753-1 Release Date: 2025-02-28T16:30:46Z Rating: moderate References: * bsc#1212607 * bsc#1219213 * bsc#1236834 Cross-References: * CVE-2023-25435 * CVE-2023-52356 CVSS scores: * CVE-2023-25435 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L * CVE-2023-25435 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-25435 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-52356 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2023-52356 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52356 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves two vulnerabilities and has one security fix can now be installed. ## Description: This update for tiff fixes the following issues: * CVE-2023-25435: Heap-buffer-overflow in extractContigSamplesShifted8bits() in tiffcrop.c (bsc#1212607). * CVE-2023-52356: Segment fault in libtiff in TIFFReadRGBATileExt() leading to denial of service (bsc#1219213). Other bugfixes: * Fixed tiff build issue on s390x as test 12 test_directory fails (bsc#1236834). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-753=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-753=1 openSUSE-SLE-15.6-2025-753=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-753=1 ## Package List: * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * tiff-debugsource-4.7.0-150600.3.8.1 * tiff-4.7.0-150600.3.8.1 * tiff-debuginfo-4.7.0-150600.3.8.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * tiff-4.7.0-150600.3.8.1 * tiff-debuginfo-4.7.0-150600.3.8.1 * libtiff6-4.7.0-150600.3.8.1 * libtiff6-debuginfo-4.7.0-150600.3.8.1 * libtiff-devel-4.7.0-150600.3.8.1 * tiff-debugsource-4.7.0-150600.3.8.1 * openSUSE Leap 15.6 (noarch) * tiff-docs-4.7.0-150600.3.8.1 * libtiff-devel-docs-4.7.0-150600.3.8.1 * openSUSE Leap 15.6 (x86_64) * libtiff6-32bit-debuginfo-4.7.0-150600.3.8.1 * libtiff-devel-32bit-4.7.0-150600.3.8.1 * libtiff6-32bit-4.7.0-150600.3.8.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libtiff6-64bit-debuginfo-4.7.0-150600.3.8.1 * libtiff6-64bit-4.7.0-150600.3.8.1 * libtiff-devel-64bit-4.7.0-150600.3.8.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * tiff-debuginfo-4.7.0-150600.3.8.1 * libtiff6-4.7.0-150600.3.8.1 * libtiff6-debuginfo-4.7.0-150600.3.8.1 * libtiff-devel-4.7.0-150600.3.8.1 * tiff-debugsource-4.7.0-150600.3.8.1 * Basesystem Module 15-SP6 (x86_64) * libtiff6-32bit-debuginfo-4.7.0-150600.3.8.1 * libtiff6-32bit-4.7.0-150600.3.8.1 ## References: * https://www.suse.com/security/cve/CVE-2023-25435.html * https://www.suse.com/security/cve/CVE-2023-52356.html * https://bugzilla.suse.com/show_bug.cgi?id=1212607 * https://bugzilla.suse.com/show_bug.cgi?id=1219213 * https://bugzilla.suse.com/show_bug.cgi?id=1236834