ALT-BU-2025-7633-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2023-00386
Уязвимость функции processCropSelections() (tools/tiffcrop.c) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-03608
Уязвимость функции LZWDecode() (libtiff /tif_lzw.c) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-03633
Уязвимость функции extractContigSamples32bits() (tiffcrop.c) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-03634
Уязвимость библиотеки LibTIFF, связанная с выходом операции за границы буфера в памяти при обработке параметров TIFFTAG_INKNAMES и TIFFTAG_NUMBEROFINKS, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-03720
Уязвимость функции loadImage() (tools/tiffcrop.c) библиотеки LibTIF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05116
Уязвимость функции extractContigSamplesShifted8bits() компонента /libtiff/tools/tiffcrop.c библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05285
Уязвимость функции TIFFReadDirectory библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05286
Уязвимость компонента tif_dir.c библиотеки LibTIFF связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05287
Уязвимость функции fax3encode библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05288
Уязвимость функции rotateimage() библиотеки LibTIFF, стеке, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05289
Уязвимость функции uv_encode() библиотеки LibTIFF, вызванная переполнением буфера на стеке, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05398
Уязвимость функции extractcontigsamplesbytes() библиотеки libtiff, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2023-05399
Уязвимость функции extractimagesection библиотеки libtiff, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
BDU:2023-05400
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3488) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05401
Уязвимость утилиты tiffcrop (tools/tiffcp.c:948) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05402
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3701) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05403
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3502) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05404
Уязвимость утилиты tiffcrop (libtiff/tif_unix.c:368, tools/tiffcrop.c:2903, tools/tiffcrop.c:6778) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05405
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3724) библиотеки libtiff , позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05406
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3516) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05407
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3609) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05973
Уязвимость утилиты tiffcrop библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05974
Уязвимость функции tiffcp (tiffcp.c) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05977
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3592) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05978
Уязвимость функции _TIFFmemcpy() (libtiff/tif_unix.c) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05979
Уязвимость функции extractContigSamplesShifted8bits() (tools/tiffcrop.c) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-06407
Уязвимость функции readSeparateTilesIntoBuffer() библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-07651
Уязвимость функции TIFFClose() библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-07663
Уязвимость компонента raw2tiff.c библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-00967
Уязвимость функции tiffreadrgbatileext() библиотеки LibTIFF, связанная с записью за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-00969
Уязвимость функции TIFFOpen() API библиотеки LibTIFF, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-01277
Уязвимость функции cpStripToTile() (tools/tiffcp.c) библиотеки LibTIFF, связанная с записью за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-04889
Уязвимость функции ExtractImageSection() библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-06610
Уязвимость библиотеки LibTIFF, связанная с разыменованием указателя NULL, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-40090
An issue was discovered in function TIFFReadDirectory libtiff before 4.4.0 allows attackers to cause a denial of service via crafted TIFF file.
Modified: 2025-04-05
CVE-2022-4645
LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json
- https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246
- https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246
- https://gitlab.com/libtiff/libtiff/-/issues/277
- https://gitlab.com/libtiff/libtiff/-/issues/277
- FEDORA-2023-f5d075f7f2
- FEDORA-2023-f5d075f7f2
- FEDORA-2023-6c1200da3d
- FEDORA-2023-6c1200da3d
- FEDORA-2023-40b675d7ae
- FEDORA-2023-40b675d7ae
- https://security.netapp.com/advisory/ntap-20230331-0001/
- https://security.netapp.com/advisory/ntap-20230331-0001/
Modified: 2025-04-03
CVE-2022-48281
processCropSelections in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based buffer overflow (e.g., "WRITE of size 307203") via a crafted TIFF image.
- https://gitlab.com/libtiff/libtiff/-/commit/d1b6b9c1b3cae2d9e37754506c1ad8f4f7b646b5
- https://gitlab.com/libtiff/libtiff/-/commit/d1b6b9c1b3cae2d9e37754506c1ad8f4f7b646b5
- https://gitlab.com/libtiff/libtiff/-/issues/488
- https://gitlab.com/libtiff/libtiff/-/issues/488
- [debian-lts-announce] 20230130 [SECURITY] [DLA 3297-1] tiff security update
- [debian-lts-announce] 20230130 [SECURITY] [DLA 3297-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230302-0004/
- https://security.netapp.com/advisory/ntap-20230302-0004/
- DSA-5333
- DSA-5333
Modified: 2025-03-21
CVE-2023-0795
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3488, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0795.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0795.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/493
- https://gitlab.com/libtiff/libtiff/-/issues/493
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0003/
- https://security.netapp.com/advisory/ntap-20230316-0003/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0796
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3592, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0796.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0796.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/499
- https://gitlab.com/libtiff/libtiff/-/issues/499
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0003/
- https://security.netapp.com/advisory/ntap-20230316-0003/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0797
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6921, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0797.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0797.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/495
- https://gitlab.com/libtiff/libtiff/-/issues/495
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0798
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3400, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0798.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0798.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/492
- https://gitlab.com/libtiff/libtiff/-/issues/492
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0003/
- https://security.netapp.com/advisory/ntap-20230316-0003/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0799
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3701, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0799.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0799.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/494
- https://gitlab.com/libtiff/libtiff/-/issues/494
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0003/
- https://security.netapp.com/advisory/ntap-20230316-0003/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0800
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3502, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0800.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0800.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/496
- https://gitlab.com/libtiff/libtiff/-/issues/496
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0002/
- https://security.netapp.com/advisory/ntap-20230316-0002/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0801
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6778, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0801.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0801.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/498
- https://gitlab.com/libtiff/libtiff/-/issues/498
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0002/
- https://security.netapp.com/advisory/ntap-20230316-0002/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0802
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3724, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0802.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0802.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/500
- https://gitlab.com/libtiff/libtiff/-/issues/500
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0002/
- https://security.netapp.com/advisory/ntap-20230316-0002/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0803
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3516, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0803.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0803.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/501
- https://gitlab.com/libtiff/libtiff/-/issues/501
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0002/
- https://security.netapp.com/advisory/ntap-20230316-0002/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0804
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3609, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0804.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0804.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/497
- https://gitlab.com/libtiff/libtiff/-/issues/497
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- FEDORA-2023-8daf1023c7
- FEDORA-2023-8daf1023c7
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230324-0009/
- https://security.netapp.com/advisory/ntap-20230324-0009/
- DSA-5361
- DSA-5361
Modified: 2024-11-21
CVE-2023-1916
A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractImageSection function in tools/tiffcrop.c, resulting in a denial of service and limited information disclosure. This issue affects libtiff versions 4.x.
- https://gitlab.com/libtiff/libtiff/-/issues/536
- https://gitlab.com/libtiff/libtiff/-/issues/536%2C
- https://gitlab.com/libtiff/libtiff/-/issues/536%2C
- https://gitlab.com/libtiff/libtiff/-/issues/537
- https://gitlab.com/libtiff/libtiff/-/issues/537
- https://support.apple.com/kb/HT213844
- https://support.apple.com/kb/HT213844
Modified: 2024-11-21
CVE-2023-25433
libtiff 4.5.0 is vulnerable to Buffer Overflow via /libtiff/tools/tiffcrop.c:8499. Incorrect updating of buffer size after rotateImage() in tiffcrop cause heap-buffer-overflow and SEGV.
- https://gitlab.com/libtiff/libtiff/-/issues/520
- https://gitlab.com/libtiff/libtiff/-/issues/520
- https://gitlab.com/libtiff/libtiff/-/merge_requests/467
- https://gitlab.com/libtiff/libtiff/-/merge_requests/467
- [debian-lts-announce] 20230731 [SECURITY] [DLA 3513-1] tiff security update
- [debian-lts-announce] 20230731 [SECURITY] [DLA 3513-1] tiff security update
Modified: 2025-01-06
CVE-2023-25434
libtiff 4.5.0 is vulnerable to Buffer Overflow via extractContigSamplesBytes() at /libtiff/tools/tiffcrop.c:3215.
Modified: 2024-12-06
CVE-2023-25435
libtiff 4.5.0 is vulnerable to Buffer Overflow via extractContigSamplesShifted8bits() at /libtiff/tools/tiffcrop.c:3753.
Modified: 2025-01-06
CVE-2023-26965
loadImage() in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based use after free via a crafted TIFF image.
- https://gitlab.com/libtiff/libtiff/-/merge_requests/472
- https://gitlab.com/libtiff/libtiff/-/merge_requests/472
- [debian-lts-announce] 20230731 [SECURITY] [DLA 3513-1] tiff security update
- [debian-lts-announce] 20230731 [SECURITY] [DLA 3513-1] tiff security update
- https://security.netapp.com/advisory/ntap-20230706-0009/
- https://security.netapp.com/advisory/ntap-20230706-0009/
Modified: 2024-11-21
CVE-2023-26966
libtiff 4.5.0 is vulnerable to Buffer Overflow in uv_encode() when libtiff reads a corrupted little-endian TIFF file and specifies the output to be big-endian.
- https://gitlab.com/libtiff/libtiff/-/issues/530
- https://gitlab.com/libtiff/libtiff/-/issues/530
- https://gitlab.com/libtiff/libtiff/-/merge_requests/473
- https://gitlab.com/libtiff/libtiff/-/merge_requests/473
- [debian-lts-announce] 20230731 [SECURITY] [DLA 3513-1] tiff security update
- [debian-lts-announce] 20230731 [SECURITY] [DLA 3513-1] tiff security update
Modified: 2025-01-22
CVE-2023-2731
A NULL pointer dereference flaw was found in Libtiff's LZWDecode() function in the libtiff/tif_lzw.c file. This flaw allows a local attacker to craft specific input data that can cause the program to dereference a NULL pointer when decompressing a TIFF format file, resulting in a program crash or denial of service.
- https://access.redhat.com/security/cve/CVE-2023-2731
- https://access.redhat.com/security/cve/CVE-2023-2731
- https://bugzilla.redhat.com/show_bug.cgi?id=2207635
- https://bugzilla.redhat.com/show_bug.cgi?id=2207635
- https://github.com/libsdl-org/libtiff/commit/9be22b639ea69e102d3847dca4c53ef025e9527b
- https://github.com/libsdl-org/libtiff/commit/9be22b639ea69e102d3847dca4c53ef025e9527b
- https://gitlab.com/libtiff/libtiff/-/issues/548
- https://gitlab.com/libtiff/libtiff/-/issues/548
- https://security.netapp.com/advisory/ntap-20230703-0009/
- https://security.netapp.com/advisory/ntap-20230703-0009/
Modified: 2024-11-21
CVE-2023-2908
A null pointer dereference issue was found in Libtiff's tif_dir.c file. This issue may allow an attacker to pass a crafted TIFF image file to the tiffcp utility which triggers a runtime error that causes undefined behavior. This will result in an application crash, eventually leading to a denial of service.
- https://access.redhat.com/security/cve/CVE-2023-2908
- https://bugzilla.redhat.com/show_bug.cgi?id=2218830
- https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f
- https://gitlab.com/libtiff/libtiff/-/merge_requests/479
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://security.netapp.com/advisory/ntap-20230731-0004/
- https://access.redhat.com/security/cve/CVE-2023-2908
- https://security.netapp.com/advisory/ntap-20230731-0004/
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://gitlab.com/libtiff/libtiff/-/merge_requests/479
- https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f
- https://bugzilla.redhat.com/show_bug.cgi?id=2218830
Modified: 2025-01-29
CVE-2023-30086
Buffer Overflow vulnerability found in Libtiff V.4.0.7 allows a local attacker to cause a denial of service via the tiffcp function in tiffcp.c.
- http://libtiff-release-v4-0-7.com
- http://libtiff-release-v4-0-7.com
- http://tiffcp.com
- http://tiffcp.com
- https://gitlab.com/libtiff/libtiff/-/issues/538
- https://gitlab.com/libtiff/libtiff/-/issues/538
- https://security.netapp.com/advisory/ntap-20230616-0003/
- https://security.netapp.com/advisory/ntap-20230616-0003/
Modified: 2025-03-14
CVE-2023-30774
A vulnerability was found in the libtiff library. This flaw causes a heap buffer overflow issue via the TIFFTAG_INKNAMES and TIFFTAG_NUMBEROFINKS values.
- 20231025 APPLE-SA-10-25-2023-4 macOS Sonoma 14.1
- https://access.redhat.com/security/cve/CVE-2023-30774
- https://bugzilla.redhat.com/show_bug.cgi?id=2187139
- https://gitlab.com/libtiff/libtiff/-/issues/463
- https://security.netapp.com/advisory/ntap-20230703-0002/
- https://support.apple.com/kb/HT213984
- 20231025 APPLE-SA-10-25-2023-4 macOS Sonoma 14.1
- https://support.apple.com/kb/HT213984
- https://security.netapp.com/advisory/ntap-20230703-0002/
- https://gitlab.com/libtiff/libtiff/-/issues/463
- https://bugzilla.redhat.com/show_bug.cgi?id=2187139
- https://access.redhat.com/security/cve/CVE-2023-30774
Modified: 2025-01-21
CVE-2023-30775
A vulnerability was found in the libtiff library. This security flaw causes a heap buffer overflow in extractContigSamples32bits, tiffcrop.c.
- https://access.redhat.com/security/cve/CVE-2023-30775
- https://access.redhat.com/security/cve/CVE-2023-30775
- https://bugzilla.redhat.com/show_bug.cgi?id=2187141
- https://bugzilla.redhat.com/show_bug.cgi?id=2187141
- https://gitlab.com/libtiff/libtiff/-/issues/464
- https://gitlab.com/libtiff/libtiff/-/issues/464
- https://security.netapp.com/advisory/ntap-20230703-0002/
- https://security.netapp.com/advisory/ntap-20230703-0002/
Modified: 2024-11-21
CVE-2023-3164
A heap-buffer-overflow vulnerability was found in LibTIFF, in extractImageSection() at tools/tiffcrop.c:7916 and tools/tiffcrop.c:7801. This flaw allows attackers to cause a denial of service via a crafted tiff file.
Modified: 2025-02-13
CVE-2023-3316
A NULL pointer dereference in TIFFClose() is caused by a failure to open an output file (non-existent path or a path that requires permissions like /dev/null) while specifying zones.
- https://gitlab.com/libtiff/libtiff/-/issues/515
- https://gitlab.com/libtiff/libtiff/-/issues/515
- https://gitlab.com/libtiff/libtiff/-/merge_requests/468
- https://gitlab.com/libtiff/libtiff/-/merge_requests/468
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://research.jfrog.com/vulnerabilities/libtiff-nullderef-dos-xray-522144/
- https://research.jfrog.com/vulnerabilities/libtiff-nullderef-dos-xray-522144/
Modified: 2024-11-21
CVE-2023-3576
A memory leak flaw was found in Libtiff's tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service.
Modified: 2024-11-21
CVE-2023-3618
A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to a buffer overflow in the Fax3Encode function in libtiff/tif_fax3.c, resulting in a denial of service.
- https://access.redhat.com/security/cve/CVE-2023-3618
- https://access.redhat.com/security/cve/CVE-2023-3618
- RHBZ#2215865
- RHBZ#2215865
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://security.netapp.com/advisory/ntap-20230824-0012/
- https://security.netapp.com/advisory/ntap-20230824-0012/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214038
- https://support.apple.com/kb/HT214038
Modified: 2024-11-21
CVE-2023-40745
LibTIFF is vulnerable to an integer overflow. This flaw allows remote attackers to cause a denial of service (application crash) or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
Modified: 2024-12-04
CVE-2023-41175
A vulnerability was found in libtiff due to multiple potential integer overflows in raw2tiff.c. This flaw allows remote attackers to cause a denial of service or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
Modified: 2024-11-21
CVE-2023-52356
A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service.
- http://seclists.org/fulldisclosure/2024/Jul/16
- http://seclists.org/fulldisclosure/2024/Jul/17
- http://seclists.org/fulldisclosure/2024/Jul/18
- http://seclists.org/fulldisclosure/2024/Jul/19
- http://seclists.org/fulldisclosure/2024/Jul/20
- http://seclists.org/fulldisclosure/2024/Jul/21
- http://seclists.org/fulldisclosure/2024/Jul/22
- http://seclists.org/fulldisclosure/2024/Jul/23
- RHSA-2024:5079
- https://access.redhat.com/security/cve/CVE-2023-52356
- https://access.redhat.com/security/cve/CVE-2023-52356
- RHBZ#2251344
- RHBZ#2251344
- https://gitlab.com/libtiff/libtiff/-/issues/622
- https://gitlab.com/libtiff/libtiff/-/issues/622
- https://gitlab.com/libtiff/libtiff/-/merge_requests/546
- https://gitlab.com/libtiff/libtiff/-/merge_requests/546
- https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html
- https://support.apple.com/kb/HT214116
- https://support.apple.com/kb/HT214117
- https://support.apple.com/kb/HT214118
- https://support.apple.com/kb/HT214119
- https://support.apple.com/kb/HT214120
- https://support.apple.com/kb/HT214122
- https://support.apple.com/kb/HT214123
- https://support.apple.com/kb/HT214124
Modified: 2024-11-21
CVE-2023-6228
An issue was found in the tiffcp utility distributed by the libtiff package where a crafted TIFF file on processing may cause a heap-based buffer overflow leads to an application crash.
Modified: 2024-11-21
CVE-2023-6277
An out-of-memory flaw was found in libtiff. Passing a crafted tiff file to TIFFOpen() API may allow a remote attacker to cause a denial of service via a craft input with size smaller than 379 KB.
- http://seclists.org/fulldisclosure/2024/Jul/16
- http://seclists.org/fulldisclosure/2024/Jul/17
- http://seclists.org/fulldisclosure/2024/Jul/18
- http://seclists.org/fulldisclosure/2024/Jul/19
- http://seclists.org/fulldisclosure/2024/Jul/20
- http://seclists.org/fulldisclosure/2024/Jul/21
- http://seclists.org/fulldisclosure/2024/Jul/22
- http://seclists.org/fulldisclosure/2024/Jul/23
- https://access.redhat.com/security/cve/CVE-2023-6277
- https://access.redhat.com/security/cve/CVE-2023-6277
- RHBZ#2251311
- RHBZ#2251311
- https://gitlab.com/libtiff/libtiff/-/issues/614
- https://gitlab.com/libtiff/libtiff/-/issues/614
- https://gitlab.com/libtiff/libtiff/-/merge_requests/545
- https://gitlab.com/libtiff/libtiff/-/merge_requests/545
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJIN6DTSL3VODZUGWEUXLEL5DR53EZMV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y7ZGN2MZXJ6E57W3L4YBM3ZPAU3T7T5C/
- https://security.netapp.com/advisory/ntap-20240119-0002/
- https://support.apple.com/kb/HT214116
- https://support.apple.com/kb/HT214117
- https://support.apple.com/kb/HT214118
- https://support.apple.com/kb/HT214119
- https://support.apple.com/kb/HT214120
- https://support.apple.com/kb/HT214122
- https://support.apple.com/kb/HT214123
- https://support.apple.com/kb/HT214124
Modified: 2024-11-21
CVE-2024-7006
A null pointer dereference flaw was found in Libtiff via `tif_dirinfo.c`. This issue may allow an attacker to trigger memory allocation failures through certain means, such as restricting the heap space size or injecting faults, causing a segmentation fault. This can cause an application crash, eventually leading to a denial of service.
Closed vulnerabilities
Modified: 2025-05-27
CVE-2025-5263
Error handling for script execution was incorrectly isolated from web content, which could have allowed cross-origin leak attacks. This vulnerability affects Firefox < 139, Firefox ESR < 115.24, and Firefox ESR < 128.11.
Modified: 2025-05-27
CVE-2025-5264
Due to insufficient escaping of the newline character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. This vulnerability affects Firefox < 139, Firefox ESR < 115.24, and Firefox ESR < 128.11.
Modified: 2025-05-27
CVE-2025-5265
Due to insufficient escaping of the ampersand character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. *This bug only affects Firefox for Windows. Other versions of Firefox are unaffected.* This vulnerability affects Firefox < 139, Firefox ESR < 115.24, and Firefox ESR < 128.11.
Modified: 2025-05-27
CVE-2025-5266
Script elements loading cross-origin resources generated load and error events which leaked information enabling XS-Leaks attacks. This vulnerability affects Firefox < 139 and Firefox ESR < 128.11.
Modified: 2025-05-27
CVE-2025-5267
A clickjacking vulnerability could have been used to trick a user into leaking saved payment card details to a malicious page. This vulnerability affects Firefox < 139 and Firefox ESR < 128.11.
Modified: 2025-05-30
CVE-2025-5268
Memory safety bugs present in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 139 and Firefox ESR < 128.11.
Modified: 2025-05-28
CVE-2025-5270
In certain cases, SNI could have been sent unencrypted even when encrypted DNS was enabled. This vulnerability affects Firefox < 139.
Modified: 2025-05-28
CVE-2025-5271
Previewing a response in Devtools ignored CSP headers, which could have allowed content injection attacks. This vulnerability affects Firefox < 139.
Modified: 2025-05-28
CVE-2025-5272
Memory safety bugs present in Firefox 138 and Thunderbird 138. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 139.