ALT-BU-2025-7743-1
Branch c9f2 update bulletin.
Closed vulnerabilities
BDU:2022-05718
Уязвимость библиотеки LibTIFF, связанная с недостатком использования функции assert(), позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05719
Уязвимость библиотеки LibTIFF, связанная с отсутствием проверки деления на ноль, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05720
Уязвимость компонента tif_dirread.c библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05724
Уязвимость компонента tif_unix.c библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05726
Уязвимость библиотеки LibTIFF, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05758
Уязвимость функции TIFFReadDirectory() компонента tif_dirread.c библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05760
Уязвимость библиотеки LibTIFF, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05790
Уязвимость функции TIFFFetchStripThing() компонента tif_dirread.c библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05792
Уязвимость функции ExtractImageSection компонента tiffcrop.c библиотеки LibTIFF, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2022-06974
Уязвимость функции TIFFReadRGBATileExt() библиотеи LibTIFF, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-00386
Уязвимость функции processCropSelections() (tools/tiffcrop.c) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01706
Уязвимость функции tiffcrop библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01707
Уязвимость функции tiffcrop библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01715
Уязвимость функции tiffcrop библиотеки LibTIFF, связанная с отсутствием проверки деления на ноль, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-03608
Уязвимость функции LZWDecode() (libtiff /tif_lzw.c) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-03633
Уязвимость функции extractContigSamples32bits() (tiffcrop.c) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-03634
Уязвимость библиотеки LibTIFF, связанная с выходом операции за границы буфера в памяти при обработке параметров TIFFTAG_INKNAMES и TIFFTAG_NUMBEROFINKS, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-03720
Уязвимость функции loadImage() (tools/tiffcrop.c) библиотеки LibTIF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05116
Уязвимость функции extractContigSamplesShifted8bits() компонента /libtiff/tools/tiffcrop.c библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05285
Уязвимость функции TIFFReadDirectory библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05286
Уязвимость компонента tif_dir.c библиотеки LibTIFF связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05287
Уязвимость функции fax3encode библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05288
Уязвимость функции rotateimage() библиотеки LibTIFF, стеке, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05289
Уязвимость функции uv_encode() библиотеки LibTIFF, вызванная переполнением буфера на стеке, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05398
Уязвимость функции extractcontigsamplesbytes() библиотеки libtiff, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2023-05399
Уязвимость функции extractimagesection библиотеки libtiff, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
BDU:2023-05400
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3488) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05401
Уязвимость утилиты tiffcrop (tools/tiffcp.c:948) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05402
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3701) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05403
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3502) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05404
Уязвимость утилиты tiffcrop (libtiff/tif_unix.c:368, tools/tiffcrop.c:2903, tools/tiffcrop.c:6778) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05405
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3724) библиотеки libtiff , позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05406
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3516) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05407
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3609) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05408
Уязвимость функции _TIFFmemcpy библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05409
Уязвимость функции _TIFFmemset библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05410
Уязвимость функции extractContigSamplesShifted24bits библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05411
Уязвимость функции tiffclose() библиотеки libtiff , связанная с некорректной обработкой жестких ссылок, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05413
Уязвимость функции writeSingleSection библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05414
Уязвимость функции _TIFFmemcpy библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05415
Уязвимость утилиты tiffcrop библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05416
Уязвимость утилиты tiffcrop библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05418
Уязвимость функции rotateimage() библиотеки libtiff , связанная с ошибкой повторного освобождения памяти, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2023-05419
Уязвимость функции rotateimage() библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05420
Уязвимость утилиты tiffcrop библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05973
Уязвимость утилиты tiffcrop библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05974
Уязвимость функции tiffcp (tiffcp.c) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05977
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3592) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05978
Уязвимость функции _TIFFmemcpy() (libtiff/tif_unix.c) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05979
Уязвимость функции extractContigSamplesShifted8bits() (tools/tiffcrop.c) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-06407
Уязвимость функции readSeparateTilesIntoBuffer() библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-07651
Уязвимость функции TIFFClose() библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-07663
Уязвимость компонента raw2tiff.c библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-09082
Уязвимость функции main() компонента tiffcp.c библиотеки LibTIFF, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании
BDU:2023-09083
Уязвимость функции LZWDecode компонента libtiff/tif_lzw.c библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-09084
Уязвимость функции LZWDecode компонента libtiff/tif_lzw.c библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-09091
Уязвимость функции _TIFFVGetField библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-00967
Уязвимость функции tiffreadrgbatileext() библиотеки LibTIFF, связанная с записью за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-00969
Уязвимость функции TIFFOpen() API библиотеки LibTIFF, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-01277
Уязвимость функции cpStripToTile() (tools/tiffcp.c) библиотеки LibTIFF, связанная с записью за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-04889
Уязвимость функции ExtractImageSection() библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-06610
Уязвимость библиотеки LibTIFF, связанная с разыменованием указателя NULL, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-07309
Уязвимость функции TIFFReadRawDataStriped() компонента tiffinfo.c библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-0561
Null source pointer passed as an argument to memcpy() function within TIFFFetchStripThing() in tif_dirread.c in libtiff versions from 3.9.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources, the fix is available with commit eecb0712.
- https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef
- https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json
- https://gitlab.com/libtiff/libtiff/-/issues/362
- https://gitlab.com/libtiff/libtiff/-/issues/362
- [debian-lts-announce] 20220306 [SECURITY] [DLA 2932-1] tiff security update
- [debian-lts-announce] 20220306 [SECURITY] [DLA 2932-1] tiff security update
- FEDORA-2022-df1df6debd
- FEDORA-2022-df1df6debd
- GLSA-202210-10
- GLSA-202210-10
- https://security.netapp.com/advisory/ntap-20220318-0001/
- https://security.netapp.com/advisory/ntap-20220318-0001/
- DSA-5108
- DSA-5108
Modified: 2024-11-21
CVE-2022-0562
Null source pointer passed as an argument to memcpy() function within TIFFReadDirectory() in tif_dirread.c in libtiff versions from 4.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources, a fix is available with commit 561599c.
- https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b
- https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json
- https://gitlab.com/libtiff/libtiff/-/issues/362
- https://gitlab.com/libtiff/libtiff/-/issues/362
- [debian-lts-announce] 20220306 [SECURITY] [DLA 2932-1] tiff security update
- [debian-lts-announce] 20220306 [SECURITY] [DLA 2932-1] tiff security update
- FEDORA-2022-df1df6debd
- FEDORA-2022-df1df6debd
- GLSA-202210-10
- GLSA-202210-10
- https://security.netapp.com/advisory/ntap-20220318-0001/
- https://security.netapp.com/advisory/ntap-20220318-0001/
- DSA-5108
- DSA-5108
Modified: 2024-11-21
CVE-2022-0865
Reachable Assertion in tiffcp in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 5e180045.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json
- https://gitlab.com/libtiff/libtiff/-/issues/385
- https://gitlab.com/libtiff/libtiff/-/issues/385
- https://gitlab.com/libtiff/libtiff/-/merge_requests/306
- https://gitlab.com/libtiff/libtiff/-/merge_requests/306
- FEDORA-2022-c39720a0ed
- FEDORA-2022-c39720a0ed
- FEDORA-2022-e2996202a0
- FEDORA-2022-e2996202a0
- GLSA-202210-10
- GLSA-202210-10
- https://security.netapp.com/advisory/ntap-20221228-0008/
- https://security.netapp.com/advisory/ntap-20221228-0008/
- DSA-5108
- DSA-5108
Modified: 2024-11-21
CVE-2022-0891
A heap buffer overflow in ExtractImageSection function in tiffcrop.c in libtiff library Version 4.3.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact
- https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
- https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json
- https://gitlab.com/libtiff/libtiff/-/issues/380
- https://gitlab.com/libtiff/libtiff/-/issues/380
- https://gitlab.com/libtiff/libtiff/-/issues/382
- https://gitlab.com/libtiff/libtiff/-/issues/382
- FEDORA-2022-c39720a0ed
- FEDORA-2022-c39720a0ed
- FEDORA-2022-e2996202a0
- FEDORA-2022-e2996202a0
- GLSA-202210-10
- GLSA-202210-10
- https://security.netapp.com/advisory/ntap-20221228-0008/
- https://security.netapp.com/advisory/ntap-20221228-0008/
- DSA-5108
- DSA-5108
Modified: 2024-11-21
CVE-2022-0907
Unchecked Return Value to NULL Pointer Dereference in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f2b656e2.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0907.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0907.json
- https://gitlab.com/libtiff/libtiff/-/issues/392
- https://gitlab.com/libtiff/libtiff/-/issues/392
- https://gitlab.com/libtiff/libtiff/-/merge_requests/314
- https://gitlab.com/libtiff/libtiff/-/merge_requests/314
- FEDORA-2022-c39720a0ed
- FEDORA-2022-c39720a0ed
- FEDORA-2022-e2996202a0
- FEDORA-2022-e2996202a0
- GLSA-202210-10
- GLSA-202210-10
- https://security.netapp.com/advisory/ntap-20220506-0002/
- https://security.netapp.com/advisory/ntap-20220506-0002/
- DSA-5108
- DSA-5108
Modified: 2024-11-21
CVE-2022-0908
Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread.c in libtiff versions up to 4.3.0 could lead to Denial of Service via crafted TIFF file.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0908.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0908.json
- https://gitlab.com/libtiff/libtiff/-/commit/a95b799f65064e4ba2e2dfc206808f86faf93e85
- https://gitlab.com/libtiff/libtiff/-/commit/a95b799f65064e4ba2e2dfc206808f86faf93e85
- https://gitlab.com/libtiff/libtiff/-/issues/383
- https://gitlab.com/libtiff/libtiff/-/issues/383
- FEDORA-2022-c39720a0ed
- FEDORA-2022-c39720a0ed
- FEDORA-2022-e2996202a0
- FEDORA-2022-e2996202a0
- GLSA-202210-10
- GLSA-202210-10
- https://security.netapp.com/advisory/ntap-20220506-0002/
- https://security.netapp.com/advisory/ntap-20220506-0002/
- DSA-5108
- DSA-5108
Modified: 2024-11-21
CVE-2022-0909
Divide By Zero error in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f8d0f9aa.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0909.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0909.json
- https://gitlab.com/libtiff/libtiff/-/issues/393
- https://gitlab.com/libtiff/libtiff/-/issues/393
- https://gitlab.com/libtiff/libtiff/-/merge_requests/310
- https://gitlab.com/libtiff/libtiff/-/merge_requests/310
- FEDORA-2022-c39720a0ed
- FEDORA-2022-c39720a0ed
- FEDORA-2022-e2996202a0
- FEDORA-2022-e2996202a0
- GLSA-202210-10
- GLSA-202210-10
- https://security.netapp.com/advisory/ntap-20220506-0002/
- https://security.netapp.com/advisory/ntap-20220506-0002/
- DSA-5108
- DSA-5108
Modified: 2024-11-21
CVE-2022-0924
Out-of-bounds Read error in tiffcp in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 408976c4.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0924.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0924.json
- https://gitlab.com/libtiff/libtiff/-/issues/278
- https://gitlab.com/libtiff/libtiff/-/issues/278
- https://gitlab.com/libtiff/libtiff/-/merge_requests/311
- https://gitlab.com/libtiff/libtiff/-/merge_requests/311
- FEDORA-2022-c39720a0ed
- FEDORA-2022-c39720a0ed
- FEDORA-2022-e2996202a0
- FEDORA-2022-e2996202a0
- GLSA-202210-10
- GLSA-202210-10
- https://security.netapp.com/advisory/ntap-20220506-0002/
- https://security.netapp.com/advisory/ntap-20220506-0002/
- DSA-5108
- DSA-5108
Modified: 2024-11-21
CVE-2022-1056
Out-of-bounds Read error in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 46dc8fcd.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1056.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1056.json
- https://gitlab.com/libtiff/libtiff/-/issues/391
- https://gitlab.com/libtiff/libtiff/-/issues/391
- https://gitlab.com/libtiff/libtiff/-/merge_requests/307
- https://gitlab.com/libtiff/libtiff/-/merge_requests/307
- GLSA-202210-10
- GLSA-202210-10
- https://security.netapp.com/advisory/ntap-20221228-0008/
- https://security.netapp.com/advisory/ntap-20221228-0008/
Modified: 2024-11-21
CVE-2022-1210
A vulnerability classified as problematic was found in LibTIFF 4.3.0. Affected by this vulnerability is the TIFF File Handler of tiff2ps. Opening a malicious file leads to a denial of service. The attack can be launched remotely but requires user interaction. The exploit has been disclosed to the public and may be used.
- https://gitlab.com/libtiff/libtiff/-/issues/402
- https://gitlab.com/libtiff/libtiff/-/issues/402
- https://gitlab.com/libtiff/libtiff/uploads/c3da94e53cf1e1e8e6d4d3780dc8c42f/example.tiff
- https://gitlab.com/libtiff/libtiff/uploads/c3da94e53cf1e1e8e6d4d3780dc8c42f/example.tiff
- GLSA-202210-10
- GLSA-202210-10
- https://security.netapp.com/advisory/ntap-20220513-0005/
- https://security.netapp.com/advisory/ntap-20220513-0005/
- https://vuldb.com/?id.196363
- https://vuldb.com/?id.196363
Modified: 2024-11-21
CVE-2022-1354
A heap buffer overflow flaw was found in Libtiffs' tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service.
- https://access.redhat.com/security/cve/CVE-2022-1354
- https://access.redhat.com/security/cve/CVE-2022-1354
- https://bugzilla.redhat.com/show_bug.cgi?id=2074404
- https://bugzilla.redhat.com/show_bug.cgi?id=2074404
- https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798
- https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798
- https://gitlab.com/libtiff/libtiff/-/issues/319
- https://gitlab.com/libtiff/libtiff/-/issues/319
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- GLSA-202210-10
- GLSA-202210-10
- https://security.netapp.com/advisory/ntap-20221014-0007/
- https://security.netapp.com/advisory/ntap-20221014-0007/
- DSA-5333
- DSA-5333
Modified: 2024-11-21
CVE-2022-1355
A stack buffer overflow flaw was found in Libtiffs' tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.
- https://access.redhat.com/security/cve/CVE-2022-1355
- https://access.redhat.com/security/cve/CVE-2022-1355
- https://bugzilla.redhat.com/show_bug.cgi?id=2074415
- https://bugzilla.redhat.com/show_bug.cgi?id=2074415
- https://gitlab.com/libtiff/libtiff/-/issues/400
- https://gitlab.com/libtiff/libtiff/-/issues/400
- https://gitlab.com/libtiff/libtiff/-/merge_requests/323
- https://gitlab.com/libtiff/libtiff/-/merge_requests/323
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- GLSA-202210-10
- GLSA-202210-10
- https://security.netapp.com/advisory/ntap-20221014-0007/
- https://security.netapp.com/advisory/ntap-20221014-0007/
- DSA-5333
- DSA-5333
Modified: 2024-11-21
CVE-2022-1622
LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-3 Additional information for APPLE-SA-2022-09-12-1 iOS 16
- 20221030 APPLE-SA-2022-10-27-3 Additional information for APPLE-SA-2022-09-12-1 iOS 16
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1622.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1622.json
- https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a
- https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a
- https://gitlab.com/libtiff/libtiff/-/issues/410
- https://gitlab.com/libtiff/libtiff/-/issues/410
- FEDORA-2022-e9fe21d102
- FEDORA-2022-e9fe21d102
- FEDORA-2022-ea3ebeff3d
- FEDORA-2022-ea3ebeff3d
- https://security.netapp.com/advisory/ntap-20220616-0005/
- https://security.netapp.com/advisory/ntap-20220616-0005/
- https://support.apple.com/kb/HT213443
- https://support.apple.com/kb/HT213443
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213446
- https://support.apple.com/kb/HT213446
- https://support.apple.com/kb/HT213486
- https://support.apple.com/kb/HT213486
- https://support.apple.com/kb/HT213487
- https://support.apple.com/kb/HT213487
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-1623
LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:624, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1623.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1623.json
- https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a
- https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a
- https://gitlab.com/libtiff/libtiff/-/issues/410
- https://gitlab.com/libtiff/libtiff/-/issues/410
- FEDORA-2022-e9fe21d102
- FEDORA-2022-e9fe21d102
- FEDORA-2022-ea3ebeff3d
- FEDORA-2022-ea3ebeff3d
- GLSA-202210-10
- GLSA-202210-10
- https://security.netapp.com/advisory/ntap-20220616-0005/
- https://security.netapp.com/advisory/ntap-20220616-0005/
- DSA-5333
- DSA-5333
Modified: 2024-11-21
CVE-2022-2056
Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2056.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2056.json
- https://gitlab.com/libtiff/libtiff/-/issues/415
- https://gitlab.com/libtiff/libtiff/-/issues/415
- https://gitlab.com/libtiff/libtiff/-/merge_requests/346
- https://gitlab.com/libtiff/libtiff/-/merge_requests/346
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- FEDORA-2022-edf7301147
- FEDORA-2022-edf7301147
- FEDORA-2022-b9c2a3a2b7
- FEDORA-2022-b9c2a3a2b7
- https://security.netapp.com/advisory/ntap-20220826-0001/
- https://security.netapp.com/advisory/ntap-20220826-0001/
- DSA-5333
- DSA-5333
Modified: 2024-11-21
CVE-2022-2057
Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2057.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2057.json
- https://gitlab.com/libtiff/libtiff/-/issues/427
- https://gitlab.com/libtiff/libtiff/-/issues/427
- https://gitlab.com/libtiff/libtiff/-/merge_requests/346
- https://gitlab.com/libtiff/libtiff/-/merge_requests/346
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- FEDORA-2022-edf7301147
- FEDORA-2022-edf7301147
- FEDORA-2022-b9c2a3a2b7
- FEDORA-2022-b9c2a3a2b7
- https://security.netapp.com/advisory/ntap-20220826-0001/
- https://security.netapp.com/advisory/ntap-20220826-0001/
- DSA-5333
- DSA-5333
Modified: 2024-11-21
CVE-2022-2058
Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2058.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2058.json
- https://gitlab.com/libtiff/libtiff/-/issues/428
- https://gitlab.com/libtiff/libtiff/-/issues/428
- https://gitlab.com/libtiff/libtiff/-/merge_requests/346
- https://gitlab.com/libtiff/libtiff/-/merge_requests/346
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- FEDORA-2022-edf7301147
- FEDORA-2022-edf7301147
- FEDORA-2022-b9c2a3a2b7
- FEDORA-2022-b9c2a3a2b7
- https://security.netapp.com/advisory/ntap-20220826-0001/
- https://security.netapp.com/advisory/ntap-20220826-0001/
- DSA-5333
- DSA-5333
Modified: 2024-11-21
CVE-2022-22844
LibTIFF 4.3.0 has an out-of-bounds read in _TIFFmemcpy in tif_unix.c in certain situations involving a custom tag and 0x0200 as the second word of the DE field.
- https://gitlab.com/libtiff/libtiff/-/issues/355
- https://gitlab.com/libtiff/libtiff/-/issues/355
- https://gitlab.com/libtiff/libtiff/-/merge_requests/287
- https://gitlab.com/libtiff/libtiff/-/merge_requests/287
- [debian-lts-announce] 20220306 [SECURITY] [DLA 2932-1] tiff security update
- [debian-lts-announce] 20220306 [SECURITY] [DLA 2932-1] tiff security update
- GLSA-202210-10
- GLSA-202210-10
- https://security.netapp.com/advisory/ntap-20220311-0002/
- https://security.netapp.com/advisory/ntap-20220311-0002/
- DSA-5108
- DSA-5108
Modified: 2024-11-21
CVE-2022-2519
There is a double free or corruption in rotateImage() at tiffcrop.c:8839 found in libtiff 4.4.0rc1
Modified: 2024-11-21
CVE-2022-2520
A flaw was found in libtiff 4.4.0rc1. There is a sysmalloc assertion fail in rotateImage() at tiffcrop.c:8621 that can cause program crash when reading a crafted input.
Modified: 2024-11-21
CVE-2022-2521
It was found in libtiff 4.4.0rc1 that there is an invalid pointer free operation in TIFFClose() at tif_close.c:131 called by tiffcrop.c:2522 that can cause a program crash and denial of service while processing crafted input.
Modified: 2024-11-21
CVE-2022-2867
libtiff's tiffcrop utility has a uint32_t underflow that can lead to out of bounds read and write. An attacker who supplies a crafted file to tiffcrop (likely via tricking a user to run tiffcrop on it with certain parameters) could cause a crash or in some cases, further exploitation.
Modified: 2024-11-21
CVE-2022-2868
libtiff's tiffcrop utility has a improper input validation flaw that can lead to out of bounds read and ultimately cause a crash if an attacker is able to supply a crafted file to tiffcrop.
Modified: 2024-11-21
CVE-2022-2869
libtiff's tiffcrop tool has a uint32_t underflow which leads to out of bounds read and write in the extractContigSamples8bits routine. An attacker who supplies a crafted file to tiffcrop could trigger this flaw, most likely by tricking a user into opening the crafted file with tiffcrop. Triggering this flaw could cause a crash or potentially further exploitation.
Modified: 2024-11-21
CVE-2022-34526
A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit v4.4.0. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted TIFF file parsed by the "tiffsplit" or "tiffcrop" utilities.
- https://gitlab.com/libtiff/libtiff/-/issues/433
- https://gitlab.com/libtiff/libtiff/-/issues/433
- https://gitlab.com/libtiff/libtiff/-/issues/486
- https://gitlab.com/libtiff/libtiff/-/issues/486
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- FEDORA-2022-83b9a5bf0f
- FEDORA-2022-83b9a5bf0f
- https://security.netapp.com/advisory/ntap-20220930-0002/
- https://security.netapp.com/advisory/ntap-20220930-0002/
- DSA-5333
- DSA-5333
Modified: 2025-05-08
CVE-2022-3597
LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c:346 when called from extractImageSection, tools/tiffcrop.c:6826, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3597.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3597.json
- https://gitlab.com/libtiff/libtiff/-/commit/236b7191f04c60d09ee836ae13b50f812c841047
- https://gitlab.com/libtiff/libtiff/-/commit/236b7191f04c60d09ee836ae13b50f812c841047
- https://gitlab.com/libtiff/libtiff/-/issues/413
- https://gitlab.com/libtiff/libtiff/-/issues/413
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- https://security.netapp.com/advisory/ntap-20230110-0001/
- https://security.netapp.com/advisory/ntap-20230110-0001/
- DSA-5333
- DSA-5333
Modified: 2025-05-08
CVE-2022-3598
LibTIFF 4.4.0 has an out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c:3604, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit cfbb883b.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3598.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3598.json
- https://gitlab.com/libtiff/libtiff/-/commit/cfbb883bf6ea7bedcb04177cc4e52d304522fdff
- https://gitlab.com/libtiff/libtiff/-/commit/cfbb883bf6ea7bedcb04177cc4e52d304522fdff
- https://gitlab.com/libtiff/libtiff/-/issues/435
- https://gitlab.com/libtiff/libtiff/-/issues/435
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- https://security.netapp.com/advisory/ntap-20230110-0001/
- https://security.netapp.com/advisory/ntap-20230110-0001/
Modified: 2025-05-08
CVE-2022-3599
LibTIFF 4.4.0 has an out-of-bounds read in writeSingleSection in tools/tiffcrop.c:7345, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3599.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3599.json
- https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246
- https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246
- https://gitlab.com/libtiff/libtiff/-/issues/398
- https://gitlab.com/libtiff/libtiff/-/issues/398
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- https://security.netapp.com/advisory/ntap-20230110-0001/
- https://security.netapp.com/advisory/ntap-20230110-0001/
- DSA-5333
- DSA-5333
Modified: 2025-05-07
CVE-2022-3626
LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c:340 when called from processCropSelections, tools/tiffcrop.c:7619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3626.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3626.json
- https://gitlab.com/libtiff/libtiff/-/commit/236b7191f04c60d09ee836ae13b50f812c841047
- https://gitlab.com/libtiff/libtiff/-/commit/236b7191f04c60d09ee836ae13b50f812c841047
- https://gitlab.com/libtiff/libtiff/-/issues/426
- https://gitlab.com/libtiff/libtiff/-/issues/426
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- https://security.netapp.com/advisory/ntap-20230110-0001/
- https://security.netapp.com/advisory/ntap-20230110-0001/
Modified: 2025-05-07
CVE-2022-3627
LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c:346 when called from extractImageSection, tools/tiffcrop.c:6860, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3627.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3627.json
- https://gitlab.com/libtiff/libtiff/-/commit/236b7191f04c60d09ee836ae13b50f812c841047
- https://gitlab.com/libtiff/libtiff/-/commit/236b7191f04c60d09ee836ae13b50f812c841047
- https://gitlab.com/libtiff/libtiff/-/issues/411
- https://gitlab.com/libtiff/libtiff/-/issues/411
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- https://security.netapp.com/advisory/ntap-20230110-0001/
- https://security.netapp.com/advisory/ntap-20230110-0001/
- DSA-5333
- DSA-5333
Modified: 2024-11-21
CVE-2022-3970
A vulnerability was found in LibTIFF. It has been classified as critical. This affects the function TIFFReadRGBATileExt of the file libtiff/tif_getimage.c. The manipulation leads to integer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 227500897dfb07fb7d27f7aa570050e62617e3be. It is recommended to apply a patch to fix this issue. The identifier VDB-213549 was assigned to this vulnerability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=53137
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=53137
- https://gitlab.com/libtiff/libtiff/-/commit/227500897dfb07fb7d27f7aa570050e62617e3be
- https://gitlab.com/libtiff/libtiff/-/commit/227500897dfb07fb7d27f7aa570050e62617e3be
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- https://oss-fuzz.com/download?testcase_id=5738253143900160
- https://oss-fuzz.com/download?testcase_id=5738253143900160
- https://security.netapp.com/advisory/ntap-20221215-0009/
- https://security.netapp.com/advisory/ntap-20221215-0009/
- https://support.apple.com/kb/HT213841
- https://support.apple.com/kb/HT213841
- https://support.apple.com/kb/HT213843
- https://support.apple.com/kb/HT213843
- https://vuldb.com/?id.213549
- https://vuldb.com/?id.213549
Modified: 2024-11-21
CVE-2022-40090
An issue was discovered in function TIFFReadDirectory libtiff before 4.4.0 allows attackers to cause a denial of service via crafted TIFF file.
Modified: 2025-04-05
CVE-2022-4645
LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json
- https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246
- https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246
- https://gitlab.com/libtiff/libtiff/-/issues/277
- https://gitlab.com/libtiff/libtiff/-/issues/277
- FEDORA-2023-f5d075f7f2
- FEDORA-2023-f5d075f7f2
- FEDORA-2023-6c1200da3d
- FEDORA-2023-6c1200da3d
- FEDORA-2023-40b675d7ae
- FEDORA-2023-40b675d7ae
- https://security.netapp.com/advisory/ntap-20230331-0001/
- https://security.netapp.com/advisory/ntap-20230331-0001/
Modified: 2025-04-03
CVE-2022-48281
processCropSelections in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based buffer overflow (e.g., "WRITE of size 307203") via a crafted TIFF image.
- https://gitlab.com/libtiff/libtiff/-/commit/d1b6b9c1b3cae2d9e37754506c1ad8f4f7b646b5
- https://gitlab.com/libtiff/libtiff/-/commit/d1b6b9c1b3cae2d9e37754506c1ad8f4f7b646b5
- https://gitlab.com/libtiff/libtiff/-/issues/488
- https://gitlab.com/libtiff/libtiff/-/issues/488
- [debian-lts-announce] 20230130 [SECURITY] [DLA 3297-1] tiff security update
- [debian-lts-announce] 20230130 [SECURITY] [DLA 3297-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230302-0004/
- https://security.netapp.com/advisory/ntap-20230302-0004/
- DSA-5333
- DSA-5333
Modified: 2025-03-21
CVE-2023-0795
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3488, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0795.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0795.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/493
- https://gitlab.com/libtiff/libtiff/-/issues/493
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0003/
- https://security.netapp.com/advisory/ntap-20230316-0003/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0796
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3592, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0796.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0796.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/499
- https://gitlab.com/libtiff/libtiff/-/issues/499
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0003/
- https://security.netapp.com/advisory/ntap-20230316-0003/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0797
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6921, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0797.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0797.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/495
- https://gitlab.com/libtiff/libtiff/-/issues/495
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0798
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3400, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0798.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0798.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/492
- https://gitlab.com/libtiff/libtiff/-/issues/492
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0003/
- https://security.netapp.com/advisory/ntap-20230316-0003/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0799
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3701, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0799.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0799.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/494
- https://gitlab.com/libtiff/libtiff/-/issues/494
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0003/
- https://security.netapp.com/advisory/ntap-20230316-0003/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0800
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3502, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0800.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0800.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/496
- https://gitlab.com/libtiff/libtiff/-/issues/496
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0002/
- https://security.netapp.com/advisory/ntap-20230316-0002/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0801
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6778, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0801.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0801.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/498
- https://gitlab.com/libtiff/libtiff/-/issues/498
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0002/
- https://security.netapp.com/advisory/ntap-20230316-0002/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0802
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3724, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0802.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0802.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/500
- https://gitlab.com/libtiff/libtiff/-/issues/500
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0002/
- https://security.netapp.com/advisory/ntap-20230316-0002/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0803
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3516, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0803.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0803.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/501
- https://gitlab.com/libtiff/libtiff/-/issues/501
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0002/
- https://security.netapp.com/advisory/ntap-20230316-0002/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0804
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3609, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0804.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0804.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/497
- https://gitlab.com/libtiff/libtiff/-/issues/497
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- FEDORA-2023-8daf1023c7
- FEDORA-2023-8daf1023c7
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230324-0009/
- https://security.netapp.com/advisory/ntap-20230324-0009/
- DSA-5361
- DSA-5361
Modified: 2024-11-21
CVE-2023-1916
A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractImageSection function in tools/tiffcrop.c, resulting in a denial of service and limited information disclosure. This issue affects libtiff versions 4.x.
- https://gitlab.com/libtiff/libtiff/-/issues/536
- https://gitlab.com/libtiff/libtiff/-/issues/536%2C
- https://gitlab.com/libtiff/libtiff/-/issues/536%2C
- https://gitlab.com/libtiff/libtiff/-/issues/537
- https://gitlab.com/libtiff/libtiff/-/issues/537
- https://support.apple.com/kb/HT213844
- https://support.apple.com/kb/HT213844
Modified: 2024-11-21
CVE-2023-25433
libtiff 4.5.0 is vulnerable to Buffer Overflow via /libtiff/tools/tiffcrop.c:8499. Incorrect updating of buffer size after rotateImage() in tiffcrop cause heap-buffer-overflow and SEGV.
- https://gitlab.com/libtiff/libtiff/-/issues/520
- https://gitlab.com/libtiff/libtiff/-/issues/520
- https://gitlab.com/libtiff/libtiff/-/merge_requests/467
- https://gitlab.com/libtiff/libtiff/-/merge_requests/467
- [debian-lts-announce] 20230731 [SECURITY] [DLA 3513-1] tiff security update
- [debian-lts-announce] 20230731 [SECURITY] [DLA 3513-1] tiff security update
Modified: 2025-01-06
CVE-2023-25434
libtiff 4.5.0 is vulnerable to Buffer Overflow via extractContigSamplesBytes() at /libtiff/tools/tiffcrop.c:3215.
Modified: 2024-12-06
CVE-2023-25435
libtiff 4.5.0 is vulnerable to Buffer Overflow via extractContigSamplesShifted8bits() at /libtiff/tools/tiffcrop.c:3753.
Modified: 2025-01-06
CVE-2023-26965
loadImage() in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based use after free via a crafted TIFF image.
- https://gitlab.com/libtiff/libtiff/-/merge_requests/472
- https://gitlab.com/libtiff/libtiff/-/merge_requests/472
- [debian-lts-announce] 20230731 [SECURITY] [DLA 3513-1] tiff security update
- [debian-lts-announce] 20230731 [SECURITY] [DLA 3513-1] tiff security update
- https://security.netapp.com/advisory/ntap-20230706-0009/
- https://security.netapp.com/advisory/ntap-20230706-0009/
Modified: 2024-11-21
CVE-2023-26966
libtiff 4.5.0 is vulnerable to Buffer Overflow in uv_encode() when libtiff reads a corrupted little-endian TIFF file and specifies the output to be big-endian.
- https://gitlab.com/libtiff/libtiff/-/issues/530
- https://gitlab.com/libtiff/libtiff/-/issues/530
- https://gitlab.com/libtiff/libtiff/-/merge_requests/473
- https://gitlab.com/libtiff/libtiff/-/merge_requests/473
- [debian-lts-announce] 20230731 [SECURITY] [DLA 3513-1] tiff security update
- [debian-lts-announce] 20230731 [SECURITY] [DLA 3513-1] tiff security update
Modified: 2025-01-22
CVE-2023-2731
A NULL pointer dereference flaw was found in Libtiff's LZWDecode() function in the libtiff/tif_lzw.c file. This flaw allows a local attacker to craft specific input data that can cause the program to dereference a NULL pointer when decompressing a TIFF format file, resulting in a program crash or denial of service.
- https://access.redhat.com/security/cve/CVE-2023-2731
- https://access.redhat.com/security/cve/CVE-2023-2731
- https://bugzilla.redhat.com/show_bug.cgi?id=2207635
- https://bugzilla.redhat.com/show_bug.cgi?id=2207635
- https://github.com/libsdl-org/libtiff/commit/9be22b639ea69e102d3847dca4c53ef025e9527b
- https://github.com/libsdl-org/libtiff/commit/9be22b639ea69e102d3847dca4c53ef025e9527b
- https://gitlab.com/libtiff/libtiff/-/issues/548
- https://gitlab.com/libtiff/libtiff/-/issues/548
- https://security.netapp.com/advisory/ntap-20230703-0009/
- https://security.netapp.com/advisory/ntap-20230703-0009/
Modified: 2024-11-21
CVE-2023-2908
A null pointer dereference issue was found in Libtiff's tif_dir.c file. This issue may allow an attacker to pass a crafted TIFF image file to the tiffcp utility which triggers a runtime error that causes undefined behavior. This will result in an application crash, eventually leading to a denial of service.
- https://access.redhat.com/security/cve/CVE-2023-2908
- https://bugzilla.redhat.com/show_bug.cgi?id=2218830
- https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f
- https://gitlab.com/libtiff/libtiff/-/merge_requests/479
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://security.netapp.com/advisory/ntap-20230731-0004/
- https://access.redhat.com/security/cve/CVE-2023-2908
- https://security.netapp.com/advisory/ntap-20230731-0004/
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://gitlab.com/libtiff/libtiff/-/merge_requests/479
- https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f
- https://bugzilla.redhat.com/show_bug.cgi?id=2218830
Modified: 2025-01-29
CVE-2023-30086
Buffer Overflow vulnerability found in Libtiff V.4.0.7 allows a local attacker to cause a denial of service via the tiffcp function in tiffcp.c.
- http://libtiff-release-v4-0-7.com
- http://libtiff-release-v4-0-7.com
- http://tiffcp.com
- http://tiffcp.com
- https://gitlab.com/libtiff/libtiff/-/issues/538
- https://gitlab.com/libtiff/libtiff/-/issues/538
- https://security.netapp.com/advisory/ntap-20230616-0003/
- https://security.netapp.com/advisory/ntap-20230616-0003/
Modified: 2025-03-14
CVE-2023-30774
A vulnerability was found in the libtiff library. This flaw causes a heap buffer overflow issue via the TIFFTAG_INKNAMES and TIFFTAG_NUMBEROFINKS values.
- 20231025 APPLE-SA-10-25-2023-4 macOS Sonoma 14.1
- https://access.redhat.com/security/cve/CVE-2023-30774
- https://bugzilla.redhat.com/show_bug.cgi?id=2187139
- https://gitlab.com/libtiff/libtiff/-/issues/463
- https://security.netapp.com/advisory/ntap-20230703-0002/
- https://support.apple.com/kb/HT213984
- 20231025 APPLE-SA-10-25-2023-4 macOS Sonoma 14.1
- https://support.apple.com/kb/HT213984
- https://security.netapp.com/advisory/ntap-20230703-0002/
- https://gitlab.com/libtiff/libtiff/-/issues/463
- https://bugzilla.redhat.com/show_bug.cgi?id=2187139
- https://access.redhat.com/security/cve/CVE-2023-30774
Modified: 2025-01-21
CVE-2023-30775
A vulnerability was found in the libtiff library. This security flaw causes a heap buffer overflow in extractContigSamples32bits, tiffcrop.c.
- https://access.redhat.com/security/cve/CVE-2023-30775
- https://access.redhat.com/security/cve/CVE-2023-30775
- https://bugzilla.redhat.com/show_bug.cgi?id=2187141
- https://bugzilla.redhat.com/show_bug.cgi?id=2187141
- https://gitlab.com/libtiff/libtiff/-/issues/464
- https://gitlab.com/libtiff/libtiff/-/issues/464
- https://security.netapp.com/advisory/ntap-20230703-0002/
- https://security.netapp.com/advisory/ntap-20230703-0002/
Modified: 2024-11-21
CVE-2023-3164
A heap-buffer-overflow vulnerability was found in LibTIFF, in extractImageSection() at tools/tiffcrop.c:7916 and tools/tiffcrop.c:7801. This flaw allows attackers to cause a denial of service via a crafted tiff file.
Modified: 2025-02-13
CVE-2023-3316
A NULL pointer dereference in TIFFClose() is caused by a failure to open an output file (non-existent path or a path that requires permissions like /dev/null) while specifying zones.
- https://gitlab.com/libtiff/libtiff/-/issues/515
- https://gitlab.com/libtiff/libtiff/-/issues/515
- https://gitlab.com/libtiff/libtiff/-/merge_requests/468
- https://gitlab.com/libtiff/libtiff/-/merge_requests/468
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://research.jfrog.com/vulnerabilities/libtiff-nullderef-dos-xray-522144/
- https://research.jfrog.com/vulnerabilities/libtiff-nullderef-dos-xray-522144/
Modified: 2024-11-21
CVE-2023-3576
A memory leak flaw was found in Libtiff's tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service.
Modified: 2024-11-21
CVE-2023-3618
A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to a buffer overflow in the Fax3Encode function in libtiff/tif_fax3.c, resulting in a denial of service.
- https://access.redhat.com/security/cve/CVE-2023-3618
- https://access.redhat.com/security/cve/CVE-2023-3618
- RHBZ#2215865
- RHBZ#2215865
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://security.netapp.com/advisory/ntap-20230824-0012/
- https://security.netapp.com/advisory/ntap-20230824-0012/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214038
- https://support.apple.com/kb/HT214038
Modified: 2024-11-21
CVE-2023-40745
LibTIFF is vulnerable to an integer overflow. This flaw allows remote attackers to cause a denial of service (application crash) or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
Modified: 2024-12-04
CVE-2023-41175
A vulnerability was found in libtiff due to multiple potential integer overflows in raw2tiff.c. This flaw allows remote attackers to cause a denial of service or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
Modified: 2024-11-21
CVE-2023-52356
A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service.
- http://seclists.org/fulldisclosure/2024/Jul/16
- http://seclists.org/fulldisclosure/2024/Jul/17
- http://seclists.org/fulldisclosure/2024/Jul/18
- http://seclists.org/fulldisclosure/2024/Jul/19
- http://seclists.org/fulldisclosure/2024/Jul/20
- http://seclists.org/fulldisclosure/2024/Jul/21
- http://seclists.org/fulldisclosure/2024/Jul/22
- http://seclists.org/fulldisclosure/2024/Jul/23
- RHSA-2024:5079
- https://access.redhat.com/security/cve/CVE-2023-52356
- https://access.redhat.com/security/cve/CVE-2023-52356
- RHBZ#2251344
- RHBZ#2251344
- https://gitlab.com/libtiff/libtiff/-/issues/622
- https://gitlab.com/libtiff/libtiff/-/issues/622
- https://gitlab.com/libtiff/libtiff/-/merge_requests/546
- https://gitlab.com/libtiff/libtiff/-/merge_requests/546
- https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html
- https://support.apple.com/kb/HT214116
- https://support.apple.com/kb/HT214117
- https://support.apple.com/kb/HT214118
- https://support.apple.com/kb/HT214119
- https://support.apple.com/kb/HT214120
- https://support.apple.com/kb/HT214122
- https://support.apple.com/kb/HT214123
- https://support.apple.com/kb/HT214124
Modified: 2024-11-21
CVE-2023-6228
An issue was found in the tiffcp utility distributed by the libtiff package where a crafted TIFF file on processing may cause a heap-based buffer overflow leads to an application crash.
Modified: 2024-11-21
CVE-2023-6277
An out-of-memory flaw was found in libtiff. Passing a crafted tiff file to TIFFOpen() API may allow a remote attacker to cause a denial of service via a craft input with size smaller than 379 KB.
- http://seclists.org/fulldisclosure/2024/Jul/16
- http://seclists.org/fulldisclosure/2024/Jul/17
- http://seclists.org/fulldisclosure/2024/Jul/18
- http://seclists.org/fulldisclosure/2024/Jul/19
- http://seclists.org/fulldisclosure/2024/Jul/20
- http://seclists.org/fulldisclosure/2024/Jul/21
- http://seclists.org/fulldisclosure/2024/Jul/22
- http://seclists.org/fulldisclosure/2024/Jul/23
- https://access.redhat.com/security/cve/CVE-2023-6277
- https://access.redhat.com/security/cve/CVE-2023-6277
- RHBZ#2251311
- RHBZ#2251311
- https://gitlab.com/libtiff/libtiff/-/issues/614
- https://gitlab.com/libtiff/libtiff/-/issues/614
- https://gitlab.com/libtiff/libtiff/-/merge_requests/545
- https://gitlab.com/libtiff/libtiff/-/merge_requests/545
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJIN6DTSL3VODZUGWEUXLEL5DR53EZMV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y7ZGN2MZXJ6E57W3L4YBM3ZPAU3T7T5C/
- https://security.netapp.com/advisory/ntap-20240119-0002/
- https://support.apple.com/kb/HT214116
- https://support.apple.com/kb/HT214117
- https://support.apple.com/kb/HT214118
- https://support.apple.com/kb/HT214119
- https://support.apple.com/kb/HT214120
- https://support.apple.com/kb/HT214122
- https://support.apple.com/kb/HT214123
- https://support.apple.com/kb/HT214124
Modified: 2024-11-21
CVE-2024-7006
A null pointer dereference flaw was found in Libtiff via `tif_dirinfo.c`. This issue may allow an attacker to trigger memory allocation failures through certain means, such as restricting the heap space size or injecting faults, causing a segmentation fault. This can cause an application crash, eventually leading to a denial of service.
Closed bugs
URL пакета устарел
URL пакета устарел
Уязвимости в libtiff
Нарушение GPL в libtiff, слинкованном с libjbig