ALT-PU-2022-5156-1
Package libtiff updated to version 4.4.0-alt1 for branch sisyphus_mipsel.
Closed vulnerabilities
BDU:2022-05718
Уязвимость библиотеки LibTIFF, связанная с недостатком использования функции assert(), позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05719
Уязвимость библиотеки LibTIFF, связанная с отсутствием проверки деления на ноль, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05720
Уязвимость компонента tif_dirread.c библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05724
Уязвимость компонента tif_unix.c библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05726
Уязвимость библиотеки LibTIFF, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05758
Уязвимость функции TIFFReadDirectory() компонента tif_dirread.c библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05760
Уязвимость библиотеки LibTIFF, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05790
Уязвимость функции TIFFFetchStripThing() компонента tif_dirread.c библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05792
Уязвимость функции ExtractImageSection компонента tiffcrop.c библиотеки LibTIFF, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-0561
Null source pointer passed as an argument to memcpy() function within TIFFFetchStripThing() in tif_dirread.c in libtiff versions from 3.9.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources, the fix is available with commit eecb0712.
- https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef
- https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json
- https://gitlab.com/libtiff/libtiff/-/issues/362
- https://gitlab.com/libtiff/libtiff/-/issues/362
- [debian-lts-announce] 20220306 [SECURITY] [DLA 2932-1] tiff security update
- [debian-lts-announce] 20220306 [SECURITY] [DLA 2932-1] tiff security update
- FEDORA-2022-df1df6debd
- FEDORA-2022-df1df6debd
- GLSA-202210-10
- GLSA-202210-10
- https://security.netapp.com/advisory/ntap-20220318-0001/
- https://security.netapp.com/advisory/ntap-20220318-0001/
- DSA-5108
- DSA-5108
Modified: 2024-11-21
CVE-2022-0562
Null source pointer passed as an argument to memcpy() function within TIFFReadDirectory() in tif_dirread.c in libtiff versions from 4.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources, a fix is available with commit 561599c.
- https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b
- https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json
- https://gitlab.com/libtiff/libtiff/-/issues/362
- https://gitlab.com/libtiff/libtiff/-/issues/362
- [debian-lts-announce] 20220306 [SECURITY] [DLA 2932-1] tiff security update
- [debian-lts-announce] 20220306 [SECURITY] [DLA 2932-1] tiff security update
- FEDORA-2022-df1df6debd
- FEDORA-2022-df1df6debd
- GLSA-202210-10
- GLSA-202210-10
- https://security.netapp.com/advisory/ntap-20220318-0001/
- https://security.netapp.com/advisory/ntap-20220318-0001/
- DSA-5108
- DSA-5108
Modified: 2024-11-21
CVE-2022-0865
Reachable Assertion in tiffcp in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 5e180045.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json
- https://gitlab.com/libtiff/libtiff/-/issues/385
- https://gitlab.com/libtiff/libtiff/-/issues/385
- https://gitlab.com/libtiff/libtiff/-/merge_requests/306
- https://gitlab.com/libtiff/libtiff/-/merge_requests/306
- FEDORA-2022-c39720a0ed
- FEDORA-2022-c39720a0ed
- FEDORA-2022-e2996202a0
- FEDORA-2022-e2996202a0
- GLSA-202210-10
- GLSA-202210-10
- https://security.netapp.com/advisory/ntap-20221228-0008/
- https://security.netapp.com/advisory/ntap-20221228-0008/
- DSA-5108
- DSA-5108
Modified: 2024-11-21
CVE-2022-0891
A heap buffer overflow in ExtractImageSection function in tiffcrop.c in libtiff library Version 4.3.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact
- https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
- https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json
- https://gitlab.com/libtiff/libtiff/-/issues/380
- https://gitlab.com/libtiff/libtiff/-/issues/380
- https://gitlab.com/libtiff/libtiff/-/issues/382
- https://gitlab.com/libtiff/libtiff/-/issues/382
- FEDORA-2022-c39720a0ed
- FEDORA-2022-c39720a0ed
- FEDORA-2022-e2996202a0
- FEDORA-2022-e2996202a0
- GLSA-202210-10
- GLSA-202210-10
- https://security.netapp.com/advisory/ntap-20221228-0008/
- https://security.netapp.com/advisory/ntap-20221228-0008/
- DSA-5108
- DSA-5108
Modified: 2024-11-21
CVE-2022-0907
Unchecked Return Value to NULL Pointer Dereference in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f2b656e2.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0907.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0907.json
- https://gitlab.com/libtiff/libtiff/-/issues/392
- https://gitlab.com/libtiff/libtiff/-/issues/392
- https://gitlab.com/libtiff/libtiff/-/merge_requests/314
- https://gitlab.com/libtiff/libtiff/-/merge_requests/314
- FEDORA-2022-c39720a0ed
- FEDORA-2022-c39720a0ed
- FEDORA-2022-e2996202a0
- FEDORA-2022-e2996202a0
- GLSA-202210-10
- GLSA-202210-10
- https://security.netapp.com/advisory/ntap-20220506-0002/
- https://security.netapp.com/advisory/ntap-20220506-0002/
- DSA-5108
- DSA-5108
Modified: 2024-11-21
CVE-2022-0908
Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread.c in libtiff versions up to 4.3.0 could lead to Denial of Service via crafted TIFF file.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0908.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0908.json
- https://gitlab.com/libtiff/libtiff/-/commit/a95b799f65064e4ba2e2dfc206808f86faf93e85
- https://gitlab.com/libtiff/libtiff/-/commit/a95b799f65064e4ba2e2dfc206808f86faf93e85
- https://gitlab.com/libtiff/libtiff/-/issues/383
- https://gitlab.com/libtiff/libtiff/-/issues/383
- FEDORA-2022-c39720a0ed
- FEDORA-2022-c39720a0ed
- FEDORA-2022-e2996202a0
- FEDORA-2022-e2996202a0
- GLSA-202210-10
- GLSA-202210-10
- https://security.netapp.com/advisory/ntap-20220506-0002/
- https://security.netapp.com/advisory/ntap-20220506-0002/
- DSA-5108
- DSA-5108
Modified: 2024-11-21
CVE-2022-0909
Divide By Zero error in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f8d0f9aa.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0909.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0909.json
- https://gitlab.com/libtiff/libtiff/-/issues/393
- https://gitlab.com/libtiff/libtiff/-/issues/393
- https://gitlab.com/libtiff/libtiff/-/merge_requests/310
- https://gitlab.com/libtiff/libtiff/-/merge_requests/310
- FEDORA-2022-c39720a0ed
- FEDORA-2022-c39720a0ed
- FEDORA-2022-e2996202a0
- FEDORA-2022-e2996202a0
- GLSA-202210-10
- GLSA-202210-10
- https://security.netapp.com/advisory/ntap-20220506-0002/
- https://security.netapp.com/advisory/ntap-20220506-0002/
- DSA-5108
- DSA-5108
Modified: 2024-11-21
CVE-2022-0924
Out-of-bounds Read error in tiffcp in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 408976c4.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0924.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0924.json
- https://gitlab.com/libtiff/libtiff/-/issues/278
- https://gitlab.com/libtiff/libtiff/-/issues/278
- https://gitlab.com/libtiff/libtiff/-/merge_requests/311
- https://gitlab.com/libtiff/libtiff/-/merge_requests/311
- FEDORA-2022-c39720a0ed
- FEDORA-2022-c39720a0ed
- FEDORA-2022-e2996202a0
- FEDORA-2022-e2996202a0
- GLSA-202210-10
- GLSA-202210-10
- https://security.netapp.com/advisory/ntap-20220506-0002/
- https://security.netapp.com/advisory/ntap-20220506-0002/
- DSA-5108
- DSA-5108
Modified: 2024-11-21
CVE-2022-1056
Out-of-bounds Read error in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 46dc8fcd.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1056.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1056.json
- https://gitlab.com/libtiff/libtiff/-/issues/391
- https://gitlab.com/libtiff/libtiff/-/issues/391
- https://gitlab.com/libtiff/libtiff/-/merge_requests/307
- https://gitlab.com/libtiff/libtiff/-/merge_requests/307
- GLSA-202210-10
- GLSA-202210-10
- https://security.netapp.com/advisory/ntap-20221228-0008/
- https://security.netapp.com/advisory/ntap-20221228-0008/
Modified: 2024-11-21
CVE-2022-1210
A vulnerability classified as problematic was found in LibTIFF 4.3.0. Affected by this vulnerability is the TIFF File Handler of tiff2ps. Opening a malicious file leads to a denial of service. The attack can be launched remotely but requires user interaction. The exploit has been disclosed to the public and may be used.
- https://gitlab.com/libtiff/libtiff/-/issues/402
- https://gitlab.com/libtiff/libtiff/-/issues/402
- https://gitlab.com/libtiff/libtiff/uploads/c3da94e53cf1e1e8e6d4d3780dc8c42f/example.tiff
- https://gitlab.com/libtiff/libtiff/uploads/c3da94e53cf1e1e8e6d4d3780dc8c42f/example.tiff
- GLSA-202210-10
- GLSA-202210-10
- https://security.netapp.com/advisory/ntap-20220513-0005/
- https://security.netapp.com/advisory/ntap-20220513-0005/
- https://vuldb.com/?id.196363
- https://vuldb.com/?id.196363
Modified: 2024-11-21
CVE-2022-1354
A heap buffer overflow flaw was found in Libtiffs' tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service.
- https://access.redhat.com/security/cve/CVE-2022-1354
- https://access.redhat.com/security/cve/CVE-2022-1354
- https://bugzilla.redhat.com/show_bug.cgi?id=2074404
- https://bugzilla.redhat.com/show_bug.cgi?id=2074404
- https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798
- https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798
- https://gitlab.com/libtiff/libtiff/-/issues/319
- https://gitlab.com/libtiff/libtiff/-/issues/319
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- GLSA-202210-10
- GLSA-202210-10
- https://security.netapp.com/advisory/ntap-20221014-0007/
- https://security.netapp.com/advisory/ntap-20221014-0007/
- DSA-5333
- DSA-5333
Modified: 2024-11-21
CVE-2022-1355
A stack buffer overflow flaw was found in Libtiffs' tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.
- https://access.redhat.com/security/cve/CVE-2022-1355
- https://access.redhat.com/security/cve/CVE-2022-1355
- https://bugzilla.redhat.com/show_bug.cgi?id=2074415
- https://bugzilla.redhat.com/show_bug.cgi?id=2074415
- https://gitlab.com/libtiff/libtiff/-/issues/400
- https://gitlab.com/libtiff/libtiff/-/issues/400
- https://gitlab.com/libtiff/libtiff/-/merge_requests/323
- https://gitlab.com/libtiff/libtiff/-/merge_requests/323
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- GLSA-202210-10
- GLSA-202210-10
- https://security.netapp.com/advisory/ntap-20221014-0007/
- https://security.netapp.com/advisory/ntap-20221014-0007/
- DSA-5333
- DSA-5333
Modified: 2024-11-21
CVE-2022-1622
LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-3 Additional information for APPLE-SA-2022-09-12-1 iOS 16
- 20221030 APPLE-SA-2022-10-27-3 Additional information for APPLE-SA-2022-09-12-1 iOS 16
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1622.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1622.json
- https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a
- https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a
- https://gitlab.com/libtiff/libtiff/-/issues/410
- https://gitlab.com/libtiff/libtiff/-/issues/410
- FEDORA-2022-e9fe21d102
- FEDORA-2022-e9fe21d102
- FEDORA-2022-ea3ebeff3d
- FEDORA-2022-ea3ebeff3d
- https://security.netapp.com/advisory/ntap-20220616-0005/
- https://security.netapp.com/advisory/ntap-20220616-0005/
- https://support.apple.com/kb/HT213443
- https://support.apple.com/kb/HT213443
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213446
- https://support.apple.com/kb/HT213446
- https://support.apple.com/kb/HT213486
- https://support.apple.com/kb/HT213486
- https://support.apple.com/kb/HT213487
- https://support.apple.com/kb/HT213487
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-1623
LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:624, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1623.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1623.json
- https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a
- https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a
- https://gitlab.com/libtiff/libtiff/-/issues/410
- https://gitlab.com/libtiff/libtiff/-/issues/410
- FEDORA-2022-e9fe21d102
- FEDORA-2022-e9fe21d102
- FEDORA-2022-ea3ebeff3d
- FEDORA-2022-ea3ebeff3d
- GLSA-202210-10
- GLSA-202210-10
- https://security.netapp.com/advisory/ntap-20220616-0005/
- https://security.netapp.com/advisory/ntap-20220616-0005/
- DSA-5333
- DSA-5333
Modified: 2024-11-21
CVE-2022-22844
LibTIFF 4.3.0 has an out-of-bounds read in _TIFFmemcpy in tif_unix.c in certain situations involving a custom tag and 0x0200 as the second word of the DE field.
- https://gitlab.com/libtiff/libtiff/-/issues/355
- https://gitlab.com/libtiff/libtiff/-/issues/355
- https://gitlab.com/libtiff/libtiff/-/merge_requests/287
- https://gitlab.com/libtiff/libtiff/-/merge_requests/287
- [debian-lts-announce] 20220306 [SECURITY] [DLA 2932-1] tiff security update
- [debian-lts-announce] 20220306 [SECURITY] [DLA 2932-1] tiff security update
- GLSA-202210-10
- GLSA-202210-10
- https://security.netapp.com/advisory/ntap-20220311-0002/
- https://security.netapp.com/advisory/ntap-20220311-0002/
- DSA-5108
- DSA-5108
Modified: 2024-11-21
CVE-2022-2867
libtiff's tiffcrop utility has a uint32_t underflow that can lead to out of bounds read and write. An attacker who supplies a crafted file to tiffcrop (likely via tricking a user to run tiffcrop on it with certain parameters) could cause a crash or in some cases, further exploitation.
Modified: 2024-11-21
CVE-2022-2868
libtiff's tiffcrop utility has a improper input validation flaw that can lead to out of bounds read and ultimately cause a crash if an attacker is able to supply a crafted file to tiffcrop.
Modified: 2024-11-21
CVE-2022-2869
libtiff's tiffcrop tool has a uint32_t underflow which leads to out of bounds read and write in the extractContigSamples8bits routine. An attacker who supplies a crafted file to tiffcrop could trigger this flaw, most likely by tricking a user into opening the crafted file with tiffcrop. Triggering this flaw could cause a crash or potentially further exploitation.