ALT-PU-2022-7483-1
Package libtiff updated to version 4.4.0-alt2 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2022-06974
Уязвимость функции TIFFReadRGBATileExt() библиотеи LibTIFF, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01706
Уязвимость функции tiffcrop библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01707
Уязвимость функции tiffcrop библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01715
Уязвимость функции tiffcrop библиотеки LibTIFF, связанная с отсутствием проверки деления на ноль, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-2056
Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2056.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2056.json
- https://gitlab.com/libtiff/libtiff/-/issues/415
- https://gitlab.com/libtiff/libtiff/-/issues/415
- https://gitlab.com/libtiff/libtiff/-/merge_requests/346
- https://gitlab.com/libtiff/libtiff/-/merge_requests/346
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- FEDORA-2022-edf7301147
- FEDORA-2022-edf7301147
- FEDORA-2022-b9c2a3a2b7
- FEDORA-2022-b9c2a3a2b7
- https://security.netapp.com/advisory/ntap-20220826-0001/
- https://security.netapp.com/advisory/ntap-20220826-0001/
- DSA-5333
- DSA-5333
Modified: 2024-11-21
CVE-2022-2057
Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2057.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2057.json
- https://gitlab.com/libtiff/libtiff/-/issues/427
- https://gitlab.com/libtiff/libtiff/-/issues/427
- https://gitlab.com/libtiff/libtiff/-/merge_requests/346
- https://gitlab.com/libtiff/libtiff/-/merge_requests/346
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- FEDORA-2022-edf7301147
- FEDORA-2022-edf7301147
- FEDORA-2022-b9c2a3a2b7
- FEDORA-2022-b9c2a3a2b7
- https://security.netapp.com/advisory/ntap-20220826-0001/
- https://security.netapp.com/advisory/ntap-20220826-0001/
- DSA-5333
- DSA-5333
Modified: 2024-11-21
CVE-2022-2058
Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2058.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2058.json
- https://gitlab.com/libtiff/libtiff/-/issues/428
- https://gitlab.com/libtiff/libtiff/-/issues/428
- https://gitlab.com/libtiff/libtiff/-/merge_requests/346
- https://gitlab.com/libtiff/libtiff/-/merge_requests/346
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- FEDORA-2022-edf7301147
- FEDORA-2022-edf7301147
- FEDORA-2022-b9c2a3a2b7
- FEDORA-2022-b9c2a3a2b7
- https://security.netapp.com/advisory/ntap-20220826-0001/
- https://security.netapp.com/advisory/ntap-20220826-0001/
- DSA-5333
- DSA-5333
Modified: 2024-11-21
CVE-2022-2519
There is a double free or corruption in rotateImage() at tiffcrop.c:8839 found in libtiff 4.4.0rc1
Modified: 2024-11-21
CVE-2022-2520
A flaw was found in libtiff 4.4.0rc1. There is a sysmalloc assertion fail in rotateImage() at tiffcrop.c:8621 that can cause program crash when reading a crafted input.
Modified: 2024-11-21
CVE-2022-2521
It was found in libtiff 4.4.0rc1 that there is an invalid pointer free operation in TIFFClose() at tif_close.c:131 called by tiffcrop.c:2522 that can cause a program crash and denial of service while processing crafted input.
Modified: 2024-11-21
CVE-2022-34526
A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit v4.4.0. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted TIFF file parsed by the "tiffsplit" or "tiffcrop" utilities.
- https://gitlab.com/libtiff/libtiff/-/issues/433
- https://gitlab.com/libtiff/libtiff/-/issues/433
- https://gitlab.com/libtiff/libtiff/-/issues/486
- https://gitlab.com/libtiff/libtiff/-/issues/486
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- FEDORA-2022-83b9a5bf0f
- FEDORA-2022-83b9a5bf0f
- https://security.netapp.com/advisory/ntap-20220930-0002/
- https://security.netapp.com/advisory/ntap-20220930-0002/
- DSA-5333
- DSA-5333
Modified: 2024-11-21
CVE-2022-3597
LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c:346 when called from extractImageSection, tools/tiffcrop.c:6826, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3597.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3597.json
- https://gitlab.com/libtiff/libtiff/-/commit/236b7191f04c60d09ee836ae13b50f812c841047
- https://gitlab.com/libtiff/libtiff/-/commit/236b7191f04c60d09ee836ae13b50f812c841047
- https://gitlab.com/libtiff/libtiff/-/issues/413
- https://gitlab.com/libtiff/libtiff/-/issues/413
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- https://security.netapp.com/advisory/ntap-20230110-0001/
- https://security.netapp.com/advisory/ntap-20230110-0001/
- DSA-5333
- DSA-5333
Modified: 2024-11-21
CVE-2022-3598
LibTIFF 4.4.0 has an out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c:3604, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit cfbb883b.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3598.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3598.json
- https://gitlab.com/libtiff/libtiff/-/commit/cfbb883bf6ea7bedcb04177cc4e52d304522fdff
- https://gitlab.com/libtiff/libtiff/-/commit/cfbb883bf6ea7bedcb04177cc4e52d304522fdff
- https://gitlab.com/libtiff/libtiff/-/issues/435
- https://gitlab.com/libtiff/libtiff/-/issues/435
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- https://security.netapp.com/advisory/ntap-20230110-0001/
- https://security.netapp.com/advisory/ntap-20230110-0001/
Modified: 2024-11-21
CVE-2022-3599
LibTIFF 4.4.0 has an out-of-bounds read in writeSingleSection in tools/tiffcrop.c:7345, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3599.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3599.json
- https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246
- https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246
- https://gitlab.com/libtiff/libtiff/-/issues/398
- https://gitlab.com/libtiff/libtiff/-/issues/398
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- https://security.netapp.com/advisory/ntap-20230110-0001/
- https://security.netapp.com/advisory/ntap-20230110-0001/
- DSA-5333
- DSA-5333
Modified: 2024-11-21
CVE-2022-3626
LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c:340 when called from processCropSelections, tools/tiffcrop.c:7619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3626.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3626.json
- https://gitlab.com/libtiff/libtiff/-/commit/236b7191f04c60d09ee836ae13b50f812c841047
- https://gitlab.com/libtiff/libtiff/-/commit/236b7191f04c60d09ee836ae13b50f812c841047
- https://gitlab.com/libtiff/libtiff/-/issues/426
- https://gitlab.com/libtiff/libtiff/-/issues/426
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- https://security.netapp.com/advisory/ntap-20230110-0001/
- https://security.netapp.com/advisory/ntap-20230110-0001/
Modified: 2024-11-21
CVE-2022-3627
LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c:346 when called from extractImageSection, tools/tiffcrop.c:6860, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3627.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3627.json
- https://gitlab.com/libtiff/libtiff/-/commit/236b7191f04c60d09ee836ae13b50f812c841047
- https://gitlab.com/libtiff/libtiff/-/commit/236b7191f04c60d09ee836ae13b50f812c841047
- https://gitlab.com/libtiff/libtiff/-/issues/411
- https://gitlab.com/libtiff/libtiff/-/issues/411
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- https://security.netapp.com/advisory/ntap-20230110-0001/
- https://security.netapp.com/advisory/ntap-20230110-0001/
- DSA-5333
- DSA-5333
Modified: 2024-11-21
CVE-2022-3970
A vulnerability was found in LibTIFF. It has been classified as critical. This affects the function TIFFReadRGBATileExt of the file libtiff/tif_getimage.c. The manipulation leads to integer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 227500897dfb07fb7d27f7aa570050e62617e3be. It is recommended to apply a patch to fix this issue. The identifier VDB-213549 was assigned to this vulnerability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=53137
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=53137
- https://gitlab.com/libtiff/libtiff/-/commit/227500897dfb07fb7d27f7aa570050e62617e3be
- https://gitlab.com/libtiff/libtiff/-/commit/227500897dfb07fb7d27f7aa570050e62617e3be
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- https://oss-fuzz.com/download?testcase_id=5738253143900160
- https://oss-fuzz.com/download?testcase_id=5738253143900160
- https://security.netapp.com/advisory/ntap-20221215-0009/
- https://security.netapp.com/advisory/ntap-20221215-0009/
- https://support.apple.com/kb/HT213841
- https://support.apple.com/kb/HT213841
- https://support.apple.com/kb/HT213843
- https://support.apple.com/kb/HT213843
- https://vuldb.com/?id.213549
- https://vuldb.com/?id.213549
Closed bugs
Уязвимости в libtiff