ALT-BU-2025-8261-4
Branch p11 update bulletin.
Package firefox-esr updated to version 128.10.1-alt1 for branch p11 in task 384919.
Closed vulnerabilities
Modified: 2026-03-04
BDU:2025-06016
Уязвимость обработчика JavaScript-сценариев браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
Modified: 2026-03-04
BDU:2025-06048
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с записью за границами буфера в памяти, позволяющая нарушителю выполнить произвольный код
Modified: 2026-04-13
CVE-2025-4918
An attacker was able to perform an out-of-bounds read or write on a JavaScript `Promise` object. This vulnerability was fixed in Firefox 138.0.4, Firefox ESR 128.10.1, Firefox ESR 115.23.1, Thunderbird 128.10.2, and Thunderbird 138.0.2.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1966612
- https://www.mozilla.org/security/advisories/mfsa2025-36/
- https://www.mozilla.org/security/advisories/mfsa2025-37/
- https://www.mozilla.org/security/advisories/mfsa2025-38/
- https://www.mozilla.org/security/advisories/mfsa2025-40/
- https://www.mozilla.org/security/advisories/mfsa2025-41/
- https://lists.debian.org/debian-lts-announce/2025/05/msg00024.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00046.html
- https://www.vicarius.io/vsociety/posts/cve-2025-4918-detect-firefox-out-of-bounds-write
- https://www.vicarius.io/vsociety/posts/cve-2025-4918-mitigate-firefox-out-of-bounds-write
Modified: 2026-04-13
CVE-2025-4919
An attacker was able to perform an out-of-bounds read or write on a JavaScript object by confusing array index sizes. This vulnerability was fixed in Firefox 138.0.4, Firefox ESR 128.10.1, Firefox ESR 115.23.1, Thunderbird 128.10.2, and Thunderbird 138.0.2.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1966614
- https://www.mozilla.org/security/advisories/mfsa2025-36/
- https://www.mozilla.org/security/advisories/mfsa2025-37/
- https://www.mozilla.org/security/advisories/mfsa2025-38/
- https://www.mozilla.org/security/advisories/mfsa2025-40/
- https://www.mozilla.org/security/advisories/mfsa2025-41/
- https://lists.debian.org/debian-lts-announce/2025/05/msg00024.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00046.html
Closed vulnerabilities
Modified: 2025-03-05
BDU:2022-05369
Уязвимость функции extractImageSection() компонента tools/tiffcrop.c библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-06-20
BDU:2023-00386
Уязвимость функции processCropSelections() (tools/tiffcrop.c) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-06-20
BDU:2023-03608
Уязвимость функции LZWDecode() (libtiff /tif_lzw.c) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-06-20
BDU:2023-03633
Уязвимость функции extractContigSamples32bits() (tiffcrop.c) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-06-20
BDU:2023-03634
Уязвимость библиотеки LibTIFF, связанная с выходом операции за границы буфера в памяти при обработке параметров TIFFTAG_INKNAMES и TIFFTAG_NUMBEROFINKS, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2026-02-16
BDU:2023-03720
Уязвимость функции loadImage() (tools/tiffcrop.c) библиотеки LibTIF, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2026-02-16
BDU:2023-05286
Уязвимость компонента tif_dir.c библиотеки LibTIFF связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2026-02-16
BDU:2023-05287
Уязвимость функции fax3encode библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-06-20
BDU:2023-05399
Уязвимость функции extractimagesection библиотеки libtiff, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
Modified: 2025-06-20
BDU:2023-05400
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3488) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-06-20
BDU:2023-05401
Уязвимость утилиты tiffcrop (tools/tiffcp.c:948) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-06-20
BDU:2023-05402
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3701) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-06-20
BDU:2023-05403
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3502) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-06-20
BDU:2023-05404
Уязвимость утилиты tiffcrop (libtiff/tif_unix.c:368, tools/tiffcrop.c:2903, tools/tiffcrop.c:6778) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-06-20
BDU:2023-05405
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3724) библиотеки libtiff , позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-06-20
BDU:2023-05406
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3516) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-06-20
BDU:2023-05407
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3609) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-09-05
BDU:2023-05421
Уязвимость утилиты tiffcrop библиотеки libtiff , позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2026-01-20
BDU:2023-05973
Уязвимость утилиты tiffcrop библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-06-20
BDU:2023-05977
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3592) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-06-20
BDU:2023-05978
Уязвимость функции _TIFFmemcpy() (libtiff/tif_unix.c) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-06-20
BDU:2023-05979
Уязвимость функции extractContigSamplesShifted8bits() (tools/tiffcrop.c) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-06-20
BDU:2023-06407
Уязвимость функции readSeparateTilesIntoBuffer() библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-06-20
BDU:2023-07651
Уязвимость функции TIFFClose() библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-06-20
BDU:2023-07663
Уязвимость компонента raw2tiff.c библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2026-01-20
BDU:2024-01246
Уязвимость функции tiffrasterscanlinesize64() библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-06-20
BDU:2024-04889
Уязвимость функции ExtractImageSection() библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2026-01-20
BDU:2024-06610
Уязвимость библиотеки LibTIFF, связанная с разыменованием указателя NULL, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-12-03
BDU:2025-13922
Уязвимость функции readSeparateStripsetoBuffer() библиотеки LibTIFF, позволяющая нарушителю выполнить произвольный код на целевой системе
Modified: 2024-11-21
CVE-2022-2953
LibTIFF 4.4.0 has an out-of-bounds read in extractImageSection in tools/tiffcrop.c:6905, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 48d6ece8.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2953.json
- https://gitlab.com/libtiff/libtiff/-/commit/48d6ece8389b01129e7d357f0985c8f938ce3da3
- https://gitlab.com/libtiff/libtiff/-/issues/414
- https://security.netapp.com/advisory/ntap-20221014-0008/
- https://www.debian.org/security/2023/dsa-5333
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2953.json
- https://gitlab.com/libtiff/libtiff/-/commit/48d6ece8389b01129e7d357f0985c8f938ce3da3
- https://gitlab.com/libtiff/libtiff/-/issues/414
- https://security.netapp.com/advisory/ntap-20221014-0008/
- https://www.debian.org/security/2023/dsa-5333
Modified: 2025-05-07
CVE-2022-3570
Multiple heap buffer overflows in tiffcrop.c utility in libtiff library Version 4.4.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3570.json
- https://gitlab.com/libtiff/libtiff/-/commit/bd94a9b383d8755a27b5a1bc27660b8ad10b094c
- https://gitlab.com/libtiff/libtiff/-/issues/381
- https://gitlab.com/libtiff/libtiff/-/issues/386
- https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html
- https://security.netapp.com/advisory/ntap-20230203-0002/
- https://www.debian.org/security/2023/dsa-5333
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3570.json
- https://gitlab.com/libtiff/libtiff/-/commit/bd94a9b383d8755a27b5a1bc27660b8ad10b094c
- https://gitlab.com/libtiff/libtiff/-/issues/381
- https://gitlab.com/libtiff/libtiff/-/issues/386
- https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html
- https://security.netapp.com/advisory/ntap-20230203-0002/
- https://www.debian.org/security/2023/dsa-5333
Modified: 2025-04-04
CVE-2022-4645
LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json
- https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246
- https://gitlab.com/libtiff/libtiff/-/issues/277
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZTFA6GGOKFPIQNHDBMXYUR4XUXUJESE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BA6GRCAQ7NR2OK5N44UQRGUJBIYKWJJH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLM763GGZVVOAXIQXG6YGTYJ5VFYNECQ/
- https://security.netapp.com/advisory/ntap-20230331-0001/
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json
- https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246
- https://gitlab.com/libtiff/libtiff/-/issues/277
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZTFA6GGOKFPIQNHDBMXYUR4XUXUJESE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BA6GRCAQ7NR2OK5N44UQRGUJBIYKWJJH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLM763GGZVVOAXIQXG6YGTYJ5VFYNECQ/
- https://security.netapp.com/advisory/ntap-20230331-0001/
Modified: 2025-04-03
CVE-2022-48281
processCropSelections in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based buffer overflow (e.g., "WRITE of size 307203") via a crafted TIFF image.
- https://gitlab.com/libtiff/libtiff/-/commit/d1b6b9c1b3cae2d9e37754506c1ad8f4f7b646b5
- https://gitlab.com/libtiff/libtiff/-/issues/488
- https://lists.debian.org/debian-lts-announce/2023/01/msg00037.html
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230302-0004/
- https://www.debian.org/security/2023/dsa-5333
- https://gitlab.com/libtiff/libtiff/-/commit/d1b6b9c1b3cae2d9e37754506c1ad8f4f7b646b5
- https://gitlab.com/libtiff/libtiff/-/issues/488
- https://lists.debian.org/debian-lts-announce/2023/01/msg00037.html
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230302-0004/
- https://www.debian.org/security/2023/dsa-5333
Modified: 2025-03-21
CVE-2023-0795
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3488, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0795.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/493
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230316-0003/
- https://www.debian.org/security/2023/dsa-5361
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0795.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/493
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230316-0003/
- https://www.debian.org/security/2023/dsa-5361
Modified: 2025-03-21
CVE-2023-0796
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3592, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0796.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/499
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230316-0003/
- https://www.debian.org/security/2023/dsa-5361
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0796.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/499
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230316-0003/
- https://www.debian.org/security/2023/dsa-5361
Modified: 2025-03-21
CVE-2023-0797
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6921, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0797.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/495
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://security.gentoo.org/glsa/202305-31
- https://www.debian.org/security/2023/dsa-5361
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0797.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/495
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://security.gentoo.org/glsa/202305-31
- https://www.debian.org/security/2023/dsa-5361
Modified: 2025-03-21
CVE-2023-0798
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3400, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0798.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/492
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230316-0003/
- https://www.debian.org/security/2023/dsa-5361
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0798.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/492
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230316-0003/
- https://www.debian.org/security/2023/dsa-5361
Modified: 2025-03-21
CVE-2023-0799
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3701, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0799.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/494
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230316-0003/
- https://www.debian.org/security/2023/dsa-5361
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0799.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/494
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230316-0003/
- https://www.debian.org/security/2023/dsa-5361
Modified: 2025-03-21
CVE-2023-0800
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3502, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0800.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/496
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230316-0002/
- https://www.debian.org/security/2023/dsa-5361
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0800.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/496
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230316-0002/
- https://www.debian.org/security/2023/dsa-5361
Modified: 2025-03-21
CVE-2023-0801
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6778, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0801.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/498
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230316-0002/
- https://www.debian.org/security/2023/dsa-5361
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0801.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/498
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230316-0002/
- https://www.debian.org/security/2023/dsa-5361
Modified: 2025-03-21
CVE-2023-0802
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3724, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0802.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/500
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230316-0002/
- https://www.debian.org/security/2023/dsa-5361
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0802.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/500
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230316-0002/
- https://www.debian.org/security/2023/dsa-5361
Modified: 2025-03-21
CVE-2023-0803
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3516, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0803.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/501
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230316-0002/
- https://www.debian.org/security/2023/dsa-5361
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0803.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/501
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230316-0002/
- https://www.debian.org/security/2023/dsa-5361
Modified: 2025-03-21
CVE-2023-0804
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3609, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0804.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/497
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FBF3UUFSB6NB3NFTQSKOOIZGXJP3T34Z/
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230324-0009/
- https://www.debian.org/security/2023/dsa-5361
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0804.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/497
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FBF3UUFSB6NB3NFTQSKOOIZGXJP3T34Z/
- https://security.gentoo.org/glsa/202305-31
- https://security.netapp.com/advisory/ntap-20230324-0009/
- https://www.debian.org/security/2023/dsa-5361
Modified: 2024-11-21
CVE-2023-1916
A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractImageSection function in tools/tiffcrop.c, resulting in a denial of service and limited information disclosure. This issue affects libtiff versions 4.x.
- https://gitlab.com/libtiff/libtiff/-/issues/536%2C
- https://gitlab.com/libtiff/libtiff/-/issues/537
- https://support.apple.com/kb/HT213844
- https://gitlab.com/libtiff/libtiff/-/issues/536
- https://gitlab.com/libtiff/libtiff/-/issues/536%2C
- https://gitlab.com/libtiff/libtiff/-/issues/537
- https://support.apple.com/kb/HT213844
Modified: 2025-11-03
CVE-2023-26965
loadImage() in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based use after free via a crafted TIFF image.
- https://gitlab.com/libtiff/libtiff/-/merge_requests/472
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://security.netapp.com/advisory/ntap-20230706-0009/
- https://gitlab.com/libtiff/libtiff/-/merge_requests/472
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://lists.debian.org/debian-lts-announce/2025/01/msg00019.html
- https://security.netapp.com/advisory/ntap-20230706-0009/
Modified: 2025-01-22
CVE-2023-2731
A NULL pointer dereference flaw was found in Libtiff's LZWDecode() function in the libtiff/tif_lzw.c file. This flaw allows a local attacker to craft specific input data that can cause the program to dereference a NULL pointer when decompressing a TIFF format file, resulting in a program crash or denial of service.
- https://access.redhat.com/security/cve/CVE-2023-2731
- https://bugzilla.redhat.com/show_bug.cgi?id=2207635
- https://github.com/libsdl-org/libtiff/commit/9be22b639ea69e102d3847dca4c53ef025e9527b
- https://gitlab.com/libtiff/libtiff/-/issues/548
- https://security.netapp.com/advisory/ntap-20230703-0009/
- https://access.redhat.com/security/cve/CVE-2023-2731
- https://bugzilla.redhat.com/show_bug.cgi?id=2207635
- https://github.com/libsdl-org/libtiff/commit/9be22b639ea69e102d3847dca4c53ef025e9527b
- https://gitlab.com/libtiff/libtiff/-/issues/548
- https://security.netapp.com/advisory/ntap-20230703-0009/
Modified: 2025-11-03
CVE-2023-2908
A null pointer dereference issue was found in Libtiff's tif_dir.c file. This issue may allow an attacker to pass a crafted TIFF image file to the tiffcp utility which triggers a runtime error that causes undefined behavior. This will result in an application crash, eventually leading to a denial of service.
- https://access.redhat.com/security/cve/CVE-2023-2908
- https://bugzilla.redhat.com/show_bug.cgi?id=2218830
- https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f
- https://gitlab.com/libtiff/libtiff/-/merge_requests/479
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://security.netapp.com/advisory/ntap-20230731-0004/
- https://access.redhat.com/security/cve/CVE-2023-2908
- https://bugzilla.redhat.com/show_bug.cgi?id=2218830
- https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f
- https://gitlab.com/libtiff/libtiff/-/merge_requests/479
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://lists.debian.org/debian-lts-announce/2025/01/msg00019.html
- https://security.netapp.com/advisory/ntap-20230731-0004/
Modified: 2025-03-14
CVE-2023-30774
A vulnerability was found in the libtiff library. This flaw causes a heap buffer overflow issue via the TIFFTAG_INKNAMES and TIFFTAG_NUMBEROFINKS values.
- http://seclists.org/fulldisclosure/2023/Oct/24
- https://access.redhat.com/security/cve/CVE-2023-30774
- https://bugzilla.redhat.com/show_bug.cgi?id=2187139
- https://gitlab.com/libtiff/libtiff/-/issues/463
- https://security.netapp.com/advisory/ntap-20230703-0002/
- https://support.apple.com/kb/HT213984
- http://seclists.org/fulldisclosure/2023/Oct/24
- https://access.redhat.com/security/cve/CVE-2023-30774
- https://bugzilla.redhat.com/show_bug.cgi?id=2187139
- https://gitlab.com/libtiff/libtiff/-/issues/463
- https://security.netapp.com/advisory/ntap-20230703-0002/
- https://support.apple.com/kb/HT213984
Modified: 2025-01-21
CVE-2023-30775
A vulnerability was found in the libtiff library. This security flaw causes a heap buffer overflow in extractContigSamples32bits, tiffcrop.c.
- https://access.redhat.com/security/cve/CVE-2023-30775
- https://bugzilla.redhat.com/show_bug.cgi?id=2187141
- https://gitlab.com/libtiff/libtiff/-/issues/464
- https://security.netapp.com/advisory/ntap-20230703-0002/
- https://access.redhat.com/security/cve/CVE-2023-30775
- https://bugzilla.redhat.com/show_bug.cgi?id=2187141
- https://gitlab.com/libtiff/libtiff/-/issues/464
- https://security.netapp.com/advisory/ntap-20230703-0002/
Modified: 2024-11-21
CVE-2023-3164
A heap-buffer-overflow vulnerability was found in LibTIFF, in extractImageSection() at tools/tiffcrop.c:7916 and tools/tiffcrop.c:7801. This flaw allows attackers to cause a denial of service via a crafted tiff file.
- https://access.redhat.com/security/cve/CVE-2023-3164
- https://bugzilla.redhat.com/show_bug.cgi?id=2213531
- https://gitlab.com/libtiff/libtiff/-/issues/542
- https://access.redhat.com/security/cve/CVE-2023-3164
- https://bugzilla.redhat.com/show_bug.cgi?id=2213531
- https://gitlab.com/libtiff/libtiff/-/issues/542
Modified: 2025-11-03
CVE-2023-3316
A NULL pointer dereference in TIFFClose() is caused by a failure to open an output file (non-existent path or a path that requires permissions like /dev/null) while specifying zones.
- https://gitlab.com/libtiff/libtiff/-/issues/515
- https://gitlab.com/libtiff/libtiff/-/merge_requests/468
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://research.jfrog.com/vulnerabilities/libtiff-nullderef-dos-xray-522144/
- https://gitlab.com/libtiff/libtiff/-/issues/515
- https://gitlab.com/libtiff/libtiff/-/merge_requests/468
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://lists.debian.org/debian-lts-announce/2025/01/msg00019.html
- https://research.jfrog.com/vulnerabilities/libtiff-nullderef-dos-xray-522144/
Modified: 2024-11-21
CVE-2023-3576
A memory leak flaw was found in Libtiff's tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service.
- https://access.redhat.com/errata/RHSA-2023:6575
- https://access.redhat.com/security/cve/CVE-2023-3576
- https://bugzilla.redhat.com/show_bug.cgi?id=2219340
- https://access.redhat.com/errata/RHSA-2023:6575
- https://access.redhat.com/security/cve/CVE-2023-3576
- https://bugzilla.redhat.com/show_bug.cgi?id=2219340
- https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html
Modified: 2025-11-03
CVE-2023-3618
A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to a buffer overflow in the Fax3Encode function in libtiff/tif_fax3.c, resulting in a denial of service.
- https://access.redhat.com/security/cve/CVE-2023-3618
- https://bugzilla.redhat.com/show_bug.cgi?id=2215865
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://security.netapp.com/advisory/ntap-20230824-0012/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214038
- https://access.redhat.com/security/cve/CVE-2023-3618
- https://bugzilla.redhat.com/show_bug.cgi?id=2215865
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://lists.debian.org/debian-lts-announce/2025/01/msg00019.html
- https://security.netapp.com/advisory/ntap-20230824-0012/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214038
Modified: 2024-11-21
CVE-2023-40745
LibTIFF is vulnerable to an integer overflow. This flaw allows remote attackers to cause a denial of service (application crash) or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
- https://access.redhat.com/errata/RHSA-2024:2289
- https://access.redhat.com/security/cve/CVE-2023-40745
- https://bugzilla.redhat.com/show_bug.cgi?id=2235265
- https://access.redhat.com/errata/RHSA-2024:2289
- https://access.redhat.com/security/cve/CVE-2023-40745
- https://bugzilla.redhat.com/show_bug.cgi?id=2235265
- https://security.netapp.com/advisory/ntap-20231110-0005/
Modified: 2024-12-04
CVE-2023-41175
A vulnerability was found in libtiff due to multiple potential integer overflows in raw2tiff.c. This flaw allows remote attackers to cause a denial of service or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
- https://access.redhat.com/errata/RHSA-2024:2289
- https://access.redhat.com/security/cve/CVE-2023-41175
- https://bugzilla.redhat.com/show_bug.cgi?id=2235264
- https://access.redhat.com/errata/RHSA-2024:2289
- https://access.redhat.com/security/cve/CVE-2023-41175
- https://bugzilla.redhat.com/show_bug.cgi?id=2235264
Modified: 2026-02-27
CVE-2023-52355
An out-of-memory flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFRasterScanlineSize64() API. This flaw allows a remote attacker to cause a denial of service via a crafted input with a size smaller than 379 KB.
- https://access.redhat.com/errata/RHSA-2025:20801
- https://access.redhat.com/errata/RHSA-2025:21994
- https://access.redhat.com/errata/RHSA-2025:23078
- https://access.redhat.com/errata/RHSA-2025:23079
- https://access.redhat.com/errata/RHSA-2025:23080
- https://access.redhat.com/errata/RHSA-2026:3461
- https://access.redhat.com/errata/RHSA-2026:3462
- https://access.redhat.com/security/cve/CVE-2023-52355
- https://bugzilla.redhat.com/show_bug.cgi?id=2251326
- https://gitlab.com/libtiff/libtiff/-/issues/621
- https://access.redhat.com/security/cve/CVE-2023-52355
- https://bugzilla.redhat.com/show_bug.cgi?id=2251326
- https://gitlab.com/libtiff/libtiff/-/issues/621
Modified: 2025-11-03
CVE-2024-7006
A null pointer dereference flaw was found in Libtiff via `tif_dirinfo.c`. This issue may allow an attacker to trigger memory allocation failures through certain means, such as restricting the heap space size or injecting faults, causing a segmentation fault. This can cause an application crash, eventually leading to a denial of service.
- https://access.redhat.com/errata/RHSA-2024:6360
- https://access.redhat.com/errata/RHSA-2024:8833
- https://access.redhat.com/errata/RHSA-2024:8914
- https://access.redhat.com/security/cve/CVE-2024-7006
- https://bugzilla.redhat.com/show_bug.cgi?id=2302996
- https://lists.debian.org/debian-lts-announce/2025/01/msg00019.html
- https://security.netapp.com/advisory/ntap-20240920-0001/
Modified: 2025-10-30
CVE-2025-8851
A vulnerability was determined in LibTIFF up to 4.5.1. Affected by this issue is the function readSeparateStripsetoBuffer of the file tools/tiffcrop.c of the component tiffcrop. The manipulation leads to stack-based buffer overflow. Local access is required to approach this attack. The patch is identified as 8a7a48d7a645992ca83062b3a1873c951661e2b3. It is recommended to apply a patch to fix this issue.
Closed bugs
lsb-desktop: Была удалена зависимость на необходимые по спецификации библиотеки Qt
lsb-desktop: soname libtiff увеличен до 6, по спецификации должен быть 5
lsb: Указать в описании, что соответствие спецификации неполное (и полное не планируется)
Package xfce4-session updated to version 4.20.2-alt1.2 for branch p11 in task 386754.
Closed bugs
Выделить в отдельный пакет wayland сессию
Closed vulnerabilities
BDU:2025-10844
Уязвимость функции VirtKey системы управления конфигурациями и удалённого выполнения операций Salt, позволяющая нарушителю обойти установленные ограничения безопасности
BDU:2025-10845
Уязвимость системы управления конфигурациями и удалённого выполнения операций Salt, связанная с отсутствием мер по очистке входных данных, позволяющая нарушителю повысить привилегии и выполнить произвольные команды
BDU:2025-10846
Уязвимость системы управления конфигурациями и удалённого выполнения операций Salt, связанная с неправильной аутентификацией, позволяющая нарушителю обойти процесс аутентификации
BDU:2025-10847
Уязвимость метода pub_ret системы управления конфигурациями и удалённого выполнения операций Salt, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-10848
Уязвимость метода _minion_event мастера системы управления конфигурациями и удалённого выполнения операций Salt, позволяющая нарушителю выполнять произвольные команды
BDU:2025-10849
Уязвимость компонента salt.auth.pki системы управления конфигурациями и удалённого выполнения операций Salt, позволяющая нарушителю обойти процесс аутентификации
BDU:2025-10865
Уязвимость системы управления конфигурациями и удалённого выполнения операций Salt, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю получить доступ на чтение и изменение данных
BDU:2025-10866
Уязвимость системы управления конфигурациями и удалённого выполнения операций Salt, связанная с недостаточной проверкой подлинности данных, позволяющая нарушителю выполнять атаки воспроизведения
BDU:2025-10867
Уязвимость метода find_file системы управления конфигурациями и удалённого выполнения операций Salt, позволяющая нарушителю манипулировать структурами данных
BDU:2025-10868
Уязвимость системы управления конфигурациями и удалённого выполнения операций Salt, связанная с неправильной авторизацией, позволяющая нарушителю получить несанкционированный доступ к системе от имени произвольного пользователя
Modified: 2025-09-09
BDU:2025-10869
Уязвимость метода recv_file системы управления конфигурациями и удалённого выполнения операций Salt, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
No data currently available.
Modified: 2026-04-15
CVE-2024-38822
Multiple methods in the salt master skip minion token validation. Therefore a misbehaving minion can impersonate another minion.
Modified: 2026-04-15
CVE-2024-38823
Salt's request server is vulnerable to replay attacks when not using a TLS encrypted transport.
Modified: 2025-07-10
CVE-2024-38824
Directory traversal vulnerability in recv_file method allows arbitrary files to be written to the master cache directory.
Modified: 2026-04-15
CVE-2024-38825
The salt.auth.pki module does not properly authenticate callers. The "password" field contains a public certificate which is validated against a CA certificate by the module. This is not pki authentication, as the caller does not need access to the corresponding private key for the authentication attempt to be accepted.
Modified: 2026-04-15
CVE-2025-22236
Minion event bus authorization bypass. An attacker with access to a minion key can craft a message which may be able to execute a job on other minions (>= 3007.0).
Modified: 2026-04-15
CVE-2025-22237
An attacker with access to a minion key can exploit the 'on demand' pillar functionality with a specially crafted git url which could cause and arbitrary command to be run on the master with the same privileges as the master process.
Modified: 2026-04-15
CVE-2025-22238
Directory traversal attack in minion file cache creation. The master's default cache is vulnerable to a directory traversal attack. Which could be leveraged to write or overwrite 'cache' files outside of the cache directory.
Modified: 2026-04-15
CVE-2025-22239
Arbitrary event injection on Salt Master. The master's "_minion_event" method can be used by and authorized minion to send arbitrary events onto the master's event bus.
Modified: 2026-04-15
CVE-2025-22240
Arbitrary directory creation or file deletion. In the find_file method of the GitFS class, a path is created using os.path.join using unvalidated input from the “tgt_env” variable. This can be exploited by an attacker to delete any file on the Master's process has permissions to.
Modified: 2026-04-15
CVE-2025-22241
File contents overwrite the VirtKey class is called when “on-demand pillar” data is requested and uses un-validated input to create paths to the “pki directory”. The functionality is used to auto-accept Minion authentication keys based on a pre-placed “authorization file” at a specific location and is present in the default configuration.
Modified: 2026-04-15
CVE-2025-22242
Worker process denial of service through file read operation. .A vulnerability exists in the Master's “pub_ret” method which is exposed to all minions. The un-sanitized input value “jid” is used to construct a path which is then opened for reading. An attacker could exploit this vulnerabilities by attempting to read from a filename that will not return any data, e.g. by targeting a pipe node on the proc file system.
Modified: 2025-06-14
GHSA-4j59-vv55-q6h3
Salt's salt.auth.pki module does not properly authenticate callers
- https://nvd.nist.gov/vuln/detail/CVE-2024-38825
- https://github.com/saltstack/salt/commit/5ff18fd0ececdfd083ddce693c3ccef30e44f155
- https://github.com/saltstack/salt/commit/d7cb64e44db5f82fd615373f5dca2eb1fb29bbab
- https://docs.saltproject.io/en/3006/topics/releases/3006.12.html
- https://docs.saltproject.io/en/3007/topics/releases/3007.4.html
- https://github.com/saltstack/salt
Modified: 2025-06-17
GHSA-7f3f-x5f5-79gw
Salt's file contents overwrite the VirtKey class
Modified: 2025-06-14
GHSA-8pcp-r83j-fc92
Salt vulnerable to directory traversal attack in file receiving method
Modified: 2025-06-14
GHSA-989c-m532-p2hv
Salt's worker process vulnerable to denial of service through file read operation
Modified: 2025-06-14
GHSA-c46w-gr7f-jm2p
Salt vulnerable to arbitrary event injection
Modified: 2025-06-14
GHSA-fcr4-h6c4-rvvp
Salt's on demand pillar functionality vulnerable to arbitrary command injections
Modified: 2025-06-14
GHSA-jh7c-xh74-h76f
Salt has minion event bus authorization bypass vulnerability
Modified: 2025-06-14
GHSA-r546-h3ff-q585
Salt vulnerable to directory traversal attack in minion file cache creation
Modified: 2025-06-14
GHSA-xh32-3m67-qjgf
Salt allows arbitrary directory creation or file deletion
Closed bugs
Потенциально лишние зависимости salt
salt-minion не находит top.sls на salt-master
