ALT-BU-2025-5935-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2022-05369
Уязвимость функции extractImageSection() компонента tools/tiffcrop.c библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-00386
Уязвимость функции processCropSelections() (tools/tiffcrop.c) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-03608
Уязвимость функции LZWDecode() (libtiff /tif_lzw.c) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-03633
Уязвимость функции extractContigSamples32bits() (tiffcrop.c) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-03634
Уязвимость библиотеки LibTIFF, связанная с выходом операции за границы буфера в памяти при обработке параметров TIFFTAG_INKNAMES и TIFFTAG_NUMBEROFINKS, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-03720
Уязвимость функции loadImage() (tools/tiffcrop.c) библиотеки LibTIF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05286
Уязвимость компонента tif_dir.c библиотеки LibTIFF связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05287
Уязвимость функции fax3encode библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05399
Уязвимость функции extractimagesection библиотеки libtiff, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
BDU:2023-05400
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3488) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05401
Уязвимость утилиты tiffcrop (tools/tiffcp.c:948) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05402
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3701) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05403
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3502) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05404
Уязвимость утилиты tiffcrop (libtiff/tif_unix.c:368, tools/tiffcrop.c:2903, tools/tiffcrop.c:6778) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05405
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3724) библиотеки libtiff , позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05406
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3516) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05407
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3609) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05421
Уязвимость утилиты tiffcrop библиотеки libtiff , позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05973
Уязвимость утилиты tiffcrop библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05977
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3592) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05978
Уязвимость функции _TIFFmemcpy() (libtiff/tif_unix.c) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05979
Уязвимость функции extractContigSamplesShifted8bits() (tools/tiffcrop.c) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-06407
Уязвимость функции readSeparateTilesIntoBuffer() библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-07651
Уязвимость функции TIFFClose() библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-07663
Уязвимость компонента raw2tiff.c библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-01246
Уязвимость функции tiffrasterscanlinesize64() библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-04889
Уязвимость функции ExtractImageSection() библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-06610
Уязвимость библиотеки LibTIFF, связанная с разыменованием указателя NULL, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-2953
LibTIFF 4.4.0 has an out-of-bounds read in extractImageSection in tools/tiffcrop.c:6905, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 48d6ece8.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2953.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2953.json
- https://gitlab.com/libtiff/libtiff/-/commit/48d6ece8389b01129e7d357f0985c8f938ce3da3
- https://gitlab.com/libtiff/libtiff/-/commit/48d6ece8389b01129e7d357f0985c8f938ce3da3
- https://gitlab.com/libtiff/libtiff/-/issues/414
- https://gitlab.com/libtiff/libtiff/-/issues/414
- https://security.netapp.com/advisory/ntap-20221014-0008/
- https://security.netapp.com/advisory/ntap-20221014-0008/
- DSA-5333
- DSA-5333
Modified: 2025-05-07
CVE-2022-3570
Multiple heap buffer overflows in tiffcrop.c utility in libtiff library Version 4.4.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3570.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3570.json
- https://gitlab.com/libtiff/libtiff/-/commit/bd94a9b383d8755a27b5a1bc27660b8ad10b094c
- https://gitlab.com/libtiff/libtiff/-/commit/bd94a9b383d8755a27b5a1bc27660b8ad10b094c
- https://gitlab.com/libtiff/libtiff/-/issues/381
- https://gitlab.com/libtiff/libtiff/-/issues/381
- https://gitlab.com/libtiff/libtiff/-/issues/386
- https://gitlab.com/libtiff/libtiff/-/issues/386
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- https://security.netapp.com/advisory/ntap-20230203-0002/
- https://security.netapp.com/advisory/ntap-20230203-0002/
- DSA-5333
- DSA-5333
Modified: 2025-04-05
CVE-2022-4645
LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json
- https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246
- https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246
- https://gitlab.com/libtiff/libtiff/-/issues/277
- https://gitlab.com/libtiff/libtiff/-/issues/277
- FEDORA-2023-f5d075f7f2
- FEDORA-2023-f5d075f7f2
- FEDORA-2023-6c1200da3d
- FEDORA-2023-6c1200da3d
- FEDORA-2023-40b675d7ae
- FEDORA-2023-40b675d7ae
- https://security.netapp.com/advisory/ntap-20230331-0001/
- https://security.netapp.com/advisory/ntap-20230331-0001/
Modified: 2025-04-03
CVE-2022-48281
processCropSelections in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based buffer overflow (e.g., "WRITE of size 307203") via a crafted TIFF image.
- https://gitlab.com/libtiff/libtiff/-/commit/d1b6b9c1b3cae2d9e37754506c1ad8f4f7b646b5
- https://gitlab.com/libtiff/libtiff/-/commit/d1b6b9c1b3cae2d9e37754506c1ad8f4f7b646b5
- https://gitlab.com/libtiff/libtiff/-/issues/488
- https://gitlab.com/libtiff/libtiff/-/issues/488
- [debian-lts-announce] 20230130 [SECURITY] [DLA 3297-1] tiff security update
- [debian-lts-announce] 20230130 [SECURITY] [DLA 3297-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230302-0004/
- https://security.netapp.com/advisory/ntap-20230302-0004/
- DSA-5333
- DSA-5333
Modified: 2025-03-21
CVE-2023-0795
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3488, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0795.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0795.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/493
- https://gitlab.com/libtiff/libtiff/-/issues/493
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0003/
- https://security.netapp.com/advisory/ntap-20230316-0003/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0796
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3592, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0796.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0796.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/499
- https://gitlab.com/libtiff/libtiff/-/issues/499
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0003/
- https://security.netapp.com/advisory/ntap-20230316-0003/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0797
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6921, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0797.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0797.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/495
- https://gitlab.com/libtiff/libtiff/-/issues/495
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0798
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3400, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0798.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0798.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/492
- https://gitlab.com/libtiff/libtiff/-/issues/492
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0003/
- https://security.netapp.com/advisory/ntap-20230316-0003/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0799
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3701, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0799.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0799.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/494
- https://gitlab.com/libtiff/libtiff/-/issues/494
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0003/
- https://security.netapp.com/advisory/ntap-20230316-0003/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0800
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3502, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0800.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0800.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/496
- https://gitlab.com/libtiff/libtiff/-/issues/496
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0002/
- https://security.netapp.com/advisory/ntap-20230316-0002/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0801
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6778, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0801.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0801.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/498
- https://gitlab.com/libtiff/libtiff/-/issues/498
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0002/
- https://security.netapp.com/advisory/ntap-20230316-0002/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0802
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3724, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0802.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0802.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/500
- https://gitlab.com/libtiff/libtiff/-/issues/500
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0002/
- https://security.netapp.com/advisory/ntap-20230316-0002/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0803
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3516, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0803.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0803.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/501
- https://gitlab.com/libtiff/libtiff/-/issues/501
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0002/
- https://security.netapp.com/advisory/ntap-20230316-0002/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0804
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3609, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0804.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0804.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/497
- https://gitlab.com/libtiff/libtiff/-/issues/497
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- FEDORA-2023-8daf1023c7
- FEDORA-2023-8daf1023c7
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230324-0009/
- https://security.netapp.com/advisory/ntap-20230324-0009/
- DSA-5361
- DSA-5361
Modified: 2024-11-21
CVE-2023-1916
A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractImageSection function in tools/tiffcrop.c, resulting in a denial of service and limited information disclosure. This issue affects libtiff versions 4.x.
- https://gitlab.com/libtiff/libtiff/-/issues/536
- https://gitlab.com/libtiff/libtiff/-/issues/536%2C
- https://gitlab.com/libtiff/libtiff/-/issues/536%2C
- https://gitlab.com/libtiff/libtiff/-/issues/537
- https://gitlab.com/libtiff/libtiff/-/issues/537
- https://support.apple.com/kb/HT213844
- https://support.apple.com/kb/HT213844
Modified: 2025-01-06
CVE-2023-26965
loadImage() in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based use after free via a crafted TIFF image.
- https://gitlab.com/libtiff/libtiff/-/merge_requests/472
- https://gitlab.com/libtiff/libtiff/-/merge_requests/472
- [debian-lts-announce] 20230731 [SECURITY] [DLA 3513-1] tiff security update
- [debian-lts-announce] 20230731 [SECURITY] [DLA 3513-1] tiff security update
- https://security.netapp.com/advisory/ntap-20230706-0009/
- https://security.netapp.com/advisory/ntap-20230706-0009/
Modified: 2025-01-22
CVE-2023-2731
A NULL pointer dereference flaw was found in Libtiff's LZWDecode() function in the libtiff/tif_lzw.c file. This flaw allows a local attacker to craft specific input data that can cause the program to dereference a NULL pointer when decompressing a TIFF format file, resulting in a program crash or denial of service.
- https://access.redhat.com/security/cve/CVE-2023-2731
- https://access.redhat.com/security/cve/CVE-2023-2731
- https://bugzilla.redhat.com/show_bug.cgi?id=2207635
- https://bugzilla.redhat.com/show_bug.cgi?id=2207635
- https://github.com/libsdl-org/libtiff/commit/9be22b639ea69e102d3847dca4c53ef025e9527b
- https://github.com/libsdl-org/libtiff/commit/9be22b639ea69e102d3847dca4c53ef025e9527b
- https://gitlab.com/libtiff/libtiff/-/issues/548
- https://gitlab.com/libtiff/libtiff/-/issues/548
- https://security.netapp.com/advisory/ntap-20230703-0009/
- https://security.netapp.com/advisory/ntap-20230703-0009/
Modified: 2024-11-21
CVE-2023-2908
A null pointer dereference issue was found in Libtiff's tif_dir.c file. This issue may allow an attacker to pass a crafted TIFF image file to the tiffcp utility which triggers a runtime error that causes undefined behavior. This will result in an application crash, eventually leading to a denial of service.
- https://access.redhat.com/security/cve/CVE-2023-2908
- https://bugzilla.redhat.com/show_bug.cgi?id=2218830
- https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f
- https://gitlab.com/libtiff/libtiff/-/merge_requests/479
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://security.netapp.com/advisory/ntap-20230731-0004/
- https://access.redhat.com/security/cve/CVE-2023-2908
- https://security.netapp.com/advisory/ntap-20230731-0004/
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://gitlab.com/libtiff/libtiff/-/merge_requests/479
- https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f
- https://bugzilla.redhat.com/show_bug.cgi?id=2218830
Modified: 2025-03-14
CVE-2023-30774
A vulnerability was found in the libtiff library. This flaw causes a heap buffer overflow issue via the TIFFTAG_INKNAMES and TIFFTAG_NUMBEROFINKS values.
- 20231025 APPLE-SA-10-25-2023-4 macOS Sonoma 14.1
- https://access.redhat.com/security/cve/CVE-2023-30774
- https://bugzilla.redhat.com/show_bug.cgi?id=2187139
- https://gitlab.com/libtiff/libtiff/-/issues/463
- https://security.netapp.com/advisory/ntap-20230703-0002/
- https://support.apple.com/kb/HT213984
- 20231025 APPLE-SA-10-25-2023-4 macOS Sonoma 14.1
- https://support.apple.com/kb/HT213984
- https://security.netapp.com/advisory/ntap-20230703-0002/
- https://gitlab.com/libtiff/libtiff/-/issues/463
- https://bugzilla.redhat.com/show_bug.cgi?id=2187139
- https://access.redhat.com/security/cve/CVE-2023-30774
Modified: 2025-01-21
CVE-2023-30775
A vulnerability was found in the libtiff library. This security flaw causes a heap buffer overflow in extractContigSamples32bits, tiffcrop.c.
- https://access.redhat.com/security/cve/CVE-2023-30775
- https://access.redhat.com/security/cve/CVE-2023-30775
- https://bugzilla.redhat.com/show_bug.cgi?id=2187141
- https://bugzilla.redhat.com/show_bug.cgi?id=2187141
- https://gitlab.com/libtiff/libtiff/-/issues/464
- https://gitlab.com/libtiff/libtiff/-/issues/464
- https://security.netapp.com/advisory/ntap-20230703-0002/
- https://security.netapp.com/advisory/ntap-20230703-0002/
Modified: 2024-11-21
CVE-2023-3164
A heap-buffer-overflow vulnerability was found in LibTIFF, in extractImageSection() at tools/tiffcrop.c:7916 and tools/tiffcrop.c:7801. This flaw allows attackers to cause a denial of service via a crafted tiff file.
Modified: 2025-02-13
CVE-2023-3316
A NULL pointer dereference in TIFFClose() is caused by a failure to open an output file (non-existent path or a path that requires permissions like /dev/null) while specifying zones.
- https://gitlab.com/libtiff/libtiff/-/issues/515
- https://gitlab.com/libtiff/libtiff/-/issues/515
- https://gitlab.com/libtiff/libtiff/-/merge_requests/468
- https://gitlab.com/libtiff/libtiff/-/merge_requests/468
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://research.jfrog.com/vulnerabilities/libtiff-nullderef-dos-xray-522144/
- https://research.jfrog.com/vulnerabilities/libtiff-nullderef-dos-xray-522144/
Modified: 2024-11-21
CVE-2023-3576
A memory leak flaw was found in Libtiff's tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service.
Modified: 2024-11-21
CVE-2023-3618
A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to a buffer overflow in the Fax3Encode function in libtiff/tif_fax3.c, resulting in a denial of service.
- https://access.redhat.com/security/cve/CVE-2023-3618
- https://access.redhat.com/security/cve/CVE-2023-3618
- RHBZ#2215865
- RHBZ#2215865
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://security.netapp.com/advisory/ntap-20230824-0012/
- https://security.netapp.com/advisory/ntap-20230824-0012/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214038
- https://support.apple.com/kb/HT214038
Modified: 2024-11-21
CVE-2023-40745
LibTIFF is vulnerable to an integer overflow. This flaw allows remote attackers to cause a denial of service (application crash) or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
Modified: 2024-12-04
CVE-2023-41175
A vulnerability was found in libtiff due to multiple potential integer overflows in raw2tiff.c. This flaw allows remote attackers to cause a denial of service or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
Modified: 2024-11-21
CVE-2023-52355
An out-of-memory flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFRasterScanlineSize64() API. This flaw allows a remote attacker to cause a denial of service via a crafted input with a size smaller than 379 KB.
Modified: 2024-11-21
CVE-2024-7006
A null pointer dereference flaw was found in Libtiff via `tif_dirinfo.c`. This issue may allow an attacker to trigger memory allocation failures through certain means, such as restricting the heap space size or injecting faults, causing a segmentation fault. This can cause an application crash, eventually leading to a denial of service.
Closed bugs
Не работают URLы с literal IPv6 адресами в sources.list
Проблема запуска apt-get через прокси сервер
Package virtualbox updated to version 7.1.8-alt1 for branch sisyphus in task 382303.
Closed vulnerabilities
Modified: 2025-04-21
CVE-2025-30725
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.1.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:H).
Closed bugs
При входе в сессию появляется уведомление VBoxClient: the VirtualBox kernel service is not running
Не стартует в Wayland
Closed bugs
Упоминание статической библиотеки в cmake-файле
Package kernel-image-repka4 updated to version 6.6.44-alt2_3.git4bdc0a7 for branch sisyphus in task 382446.
Closed bugs
Убрать симлинки на dtb
Closed bugs
ghci: ошибка запуска
Closed bugs
Падает при hardcopy
Package gnome-control-center updated to version 48.1-alt2 for branch sisyphus in task 382527.
Closed bugs
gnome-control-center: segfault при открытии пункта настроек "Система -> Дата и время"
Package alt-components-base updated to version 0.6.9-alt1 for branch sisyphus in task 382544.
Closed bugs
Исправить опечатки в описании компонентов alt-components-base