ALT-PU-2025-7171-5
Closed vulnerabilities
BDU:2023-00386
Уязвимость функции processCropSelections() (tools/tiffcrop.c) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-03608
Уязвимость функции LZWDecode() (libtiff /tif_lzw.c) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-03633
Уязвимость функции extractContigSamples32bits() (tiffcrop.c) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-03634
Уязвимость библиотеки LibTIFF, связанная с выходом операции за границы буфера в памяти при обработке параметров TIFFTAG_INKNAMES и TIFFTAG_NUMBEROFINKS, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-03720
Уязвимость функции loadImage() (tools/tiffcrop.c) библиотеки LibTIF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05116
Уязвимость функции extractContigSamplesShifted8bits() компонента /libtiff/tools/tiffcrop.c библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05285
Уязвимость функции TIFFReadDirectory библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05286
Уязвимость компонента tif_dir.c библиотеки LibTIFF связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05287
Уязвимость функции fax3encode библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05288
Уязвимость функции rotateimage() библиотеки LibTIFF, стеке, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05289
Уязвимость функции uv_encode() библиотеки LibTIFF, вызванная переполнением буфера на стеке, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05398
Уязвимость функции extractcontigsamplesbytes() библиотеки libtiff, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2023-05399
Уязвимость функции extractimagesection библиотеки libtiff, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
BDU:2023-05400
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3488) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05401
Уязвимость утилиты tiffcrop (tools/tiffcp.c:948) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05402
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3701) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05403
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3502) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05404
Уязвимость утилиты tiffcrop (libtiff/tif_unix.c:368, tools/tiffcrop.c:2903, tools/tiffcrop.c:6778) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05405
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3724) библиотеки libtiff , позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05406
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3516) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05407
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3609) библиотеки libtiff, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05973
Уязвимость утилиты tiffcrop библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05974
Уязвимость функции tiffcp (tiffcp.c) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05977
Уязвимость утилиты tiffcrop (tools/tiffcrop.c:3592) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05978
Уязвимость функции _TIFFmemcpy() (libtiff/tif_unix.c) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05979
Уязвимость функции extractContigSamplesShifted8bits() (tools/tiffcrop.c) библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-06407
Уязвимость функции readSeparateTilesIntoBuffer() библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-07651
Уязвимость функции TIFFClose() библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-07663
Уязвимость компонента raw2tiff.c библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-00967
Уязвимость функции tiffreadrgbatileext() библиотеки LibTIFF, связанная с записью за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-00969
Уязвимость функции TIFFOpen() API библиотеки LibTIFF, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-01277
Уязвимость функции cpStripToTile() (tools/tiffcp.c) библиотеки LibTIFF, связанная с записью за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-04889
Уязвимость функции ExtractImageSection() библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-06610
Уязвимость библиотеки LibTIFF, связанная с разыменованием указателя NULL, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-40090
An issue was discovered in function TIFFReadDirectory libtiff before 4.4.0 allows attackers to cause a denial of service via crafted TIFF file.
Modified: 2025-04-05
CVE-2022-4645
LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json
- https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246
- https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246
- https://gitlab.com/libtiff/libtiff/-/issues/277
- https://gitlab.com/libtiff/libtiff/-/issues/277
- FEDORA-2023-f5d075f7f2
- FEDORA-2023-f5d075f7f2
- FEDORA-2023-6c1200da3d
- FEDORA-2023-6c1200da3d
- FEDORA-2023-40b675d7ae
- FEDORA-2023-40b675d7ae
- https://security.netapp.com/advisory/ntap-20230331-0001/
- https://security.netapp.com/advisory/ntap-20230331-0001/
Modified: 2025-04-03
CVE-2022-48281
processCropSelections in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based buffer overflow (e.g., "WRITE of size 307203") via a crafted TIFF image.
- https://gitlab.com/libtiff/libtiff/-/commit/d1b6b9c1b3cae2d9e37754506c1ad8f4f7b646b5
- https://gitlab.com/libtiff/libtiff/-/commit/d1b6b9c1b3cae2d9e37754506c1ad8f4f7b646b5
- https://gitlab.com/libtiff/libtiff/-/issues/488
- https://gitlab.com/libtiff/libtiff/-/issues/488
- [debian-lts-announce] 20230130 [SECURITY] [DLA 3297-1] tiff security update
- [debian-lts-announce] 20230130 [SECURITY] [DLA 3297-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230302-0004/
- https://security.netapp.com/advisory/ntap-20230302-0004/
- DSA-5333
- DSA-5333
Modified: 2025-03-21
CVE-2023-0795
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3488, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0795.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0795.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/493
- https://gitlab.com/libtiff/libtiff/-/issues/493
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0003/
- https://security.netapp.com/advisory/ntap-20230316-0003/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0796
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3592, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0796.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0796.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/499
- https://gitlab.com/libtiff/libtiff/-/issues/499
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0003/
- https://security.netapp.com/advisory/ntap-20230316-0003/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0797
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6921, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0797.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0797.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/495
- https://gitlab.com/libtiff/libtiff/-/issues/495
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0798
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3400, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0798.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0798.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/492
- https://gitlab.com/libtiff/libtiff/-/issues/492
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0003/
- https://security.netapp.com/advisory/ntap-20230316-0003/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0799
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3701, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0799.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0799.json
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/494
- https://gitlab.com/libtiff/libtiff/-/issues/494
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0003/
- https://security.netapp.com/advisory/ntap-20230316-0003/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0800
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3502, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0800.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0800.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/496
- https://gitlab.com/libtiff/libtiff/-/issues/496
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0002/
- https://security.netapp.com/advisory/ntap-20230316-0002/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0801
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6778, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0801.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0801.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/498
- https://gitlab.com/libtiff/libtiff/-/issues/498
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0002/
- https://security.netapp.com/advisory/ntap-20230316-0002/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0802
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3724, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0802.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0802.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/500
- https://gitlab.com/libtiff/libtiff/-/issues/500
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0002/
- https://security.netapp.com/advisory/ntap-20230316-0002/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0803
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3516, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0803.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0803.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/501
- https://gitlab.com/libtiff/libtiff/-/issues/501
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230316-0002/
- https://security.netapp.com/advisory/ntap-20230316-0002/
- DSA-5361
- DSA-5361
Modified: 2025-03-21
CVE-2023-0804
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3609, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0804.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0804.json
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
- https://gitlab.com/libtiff/libtiff/-/issues/497
- https://gitlab.com/libtiff/libtiff/-/issues/497
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- [debian-lts-announce] 20230221 [SECURITY] [DLA 3333-1] tiff security update
- FEDORA-2023-8daf1023c7
- FEDORA-2023-8daf1023c7
- GLSA-202305-31
- GLSA-202305-31
- https://security.netapp.com/advisory/ntap-20230324-0009/
- https://security.netapp.com/advisory/ntap-20230324-0009/
- DSA-5361
- DSA-5361
Modified: 2024-11-21
CVE-2023-1916
A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractImageSection function in tools/tiffcrop.c, resulting in a denial of service and limited information disclosure. This issue affects libtiff versions 4.x.
- https://gitlab.com/libtiff/libtiff/-/issues/536
- https://gitlab.com/libtiff/libtiff/-/issues/536%2C
- https://gitlab.com/libtiff/libtiff/-/issues/536%2C
- https://gitlab.com/libtiff/libtiff/-/issues/537
- https://gitlab.com/libtiff/libtiff/-/issues/537
- https://support.apple.com/kb/HT213844
- https://support.apple.com/kb/HT213844
Modified: 2024-11-21
CVE-2023-25433
libtiff 4.5.0 is vulnerable to Buffer Overflow via /libtiff/tools/tiffcrop.c:8499. Incorrect updating of buffer size after rotateImage() in tiffcrop cause heap-buffer-overflow and SEGV.
- https://gitlab.com/libtiff/libtiff/-/issues/520
- https://gitlab.com/libtiff/libtiff/-/issues/520
- https://gitlab.com/libtiff/libtiff/-/merge_requests/467
- https://gitlab.com/libtiff/libtiff/-/merge_requests/467
- [debian-lts-announce] 20230731 [SECURITY] [DLA 3513-1] tiff security update
- [debian-lts-announce] 20230731 [SECURITY] [DLA 3513-1] tiff security update
Modified: 2025-01-06
CVE-2023-25434
libtiff 4.5.0 is vulnerable to Buffer Overflow via extractContigSamplesBytes() at /libtiff/tools/tiffcrop.c:3215.
Modified: 2024-12-06
CVE-2023-25435
libtiff 4.5.0 is vulnerable to Buffer Overflow via extractContigSamplesShifted8bits() at /libtiff/tools/tiffcrop.c:3753.
Modified: 2025-01-06
CVE-2023-26965
loadImage() in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based use after free via a crafted TIFF image.
- https://gitlab.com/libtiff/libtiff/-/merge_requests/472
- https://gitlab.com/libtiff/libtiff/-/merge_requests/472
- [debian-lts-announce] 20230731 [SECURITY] [DLA 3513-1] tiff security update
- [debian-lts-announce] 20230731 [SECURITY] [DLA 3513-1] tiff security update
- https://security.netapp.com/advisory/ntap-20230706-0009/
- https://security.netapp.com/advisory/ntap-20230706-0009/
Modified: 2024-11-21
CVE-2023-26966
libtiff 4.5.0 is vulnerable to Buffer Overflow in uv_encode() when libtiff reads a corrupted little-endian TIFF file and specifies the output to be big-endian.
- https://gitlab.com/libtiff/libtiff/-/issues/530
- https://gitlab.com/libtiff/libtiff/-/issues/530
- https://gitlab.com/libtiff/libtiff/-/merge_requests/473
- https://gitlab.com/libtiff/libtiff/-/merge_requests/473
- [debian-lts-announce] 20230731 [SECURITY] [DLA 3513-1] tiff security update
- [debian-lts-announce] 20230731 [SECURITY] [DLA 3513-1] tiff security update
Modified: 2025-01-22
CVE-2023-2731
A NULL pointer dereference flaw was found in Libtiff's LZWDecode() function in the libtiff/tif_lzw.c file. This flaw allows a local attacker to craft specific input data that can cause the program to dereference a NULL pointer when decompressing a TIFF format file, resulting in a program crash or denial of service.
- https://access.redhat.com/security/cve/CVE-2023-2731
- https://access.redhat.com/security/cve/CVE-2023-2731
- https://bugzilla.redhat.com/show_bug.cgi?id=2207635
- https://bugzilla.redhat.com/show_bug.cgi?id=2207635
- https://github.com/libsdl-org/libtiff/commit/9be22b639ea69e102d3847dca4c53ef025e9527b
- https://github.com/libsdl-org/libtiff/commit/9be22b639ea69e102d3847dca4c53ef025e9527b
- https://gitlab.com/libtiff/libtiff/-/issues/548
- https://gitlab.com/libtiff/libtiff/-/issues/548
- https://security.netapp.com/advisory/ntap-20230703-0009/
- https://security.netapp.com/advisory/ntap-20230703-0009/
Modified: 2024-11-21
CVE-2023-2908
A null pointer dereference issue was found in Libtiff's tif_dir.c file. This issue may allow an attacker to pass a crafted TIFF image file to the tiffcp utility which triggers a runtime error that causes undefined behavior. This will result in an application crash, eventually leading to a denial of service.
- https://access.redhat.com/security/cve/CVE-2023-2908
- https://bugzilla.redhat.com/show_bug.cgi?id=2218830
- https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f
- https://gitlab.com/libtiff/libtiff/-/merge_requests/479
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://security.netapp.com/advisory/ntap-20230731-0004/
- https://access.redhat.com/security/cve/CVE-2023-2908
- https://security.netapp.com/advisory/ntap-20230731-0004/
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://gitlab.com/libtiff/libtiff/-/merge_requests/479
- https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f
- https://bugzilla.redhat.com/show_bug.cgi?id=2218830
Modified: 2025-01-29
CVE-2023-30086
Buffer Overflow vulnerability found in Libtiff V.4.0.7 allows a local attacker to cause a denial of service via the tiffcp function in tiffcp.c.
- http://libtiff-release-v4-0-7.com
- http://libtiff-release-v4-0-7.com
- http://tiffcp.com
- http://tiffcp.com
- https://gitlab.com/libtiff/libtiff/-/issues/538
- https://gitlab.com/libtiff/libtiff/-/issues/538
- https://security.netapp.com/advisory/ntap-20230616-0003/
- https://security.netapp.com/advisory/ntap-20230616-0003/
Modified: 2025-03-14
CVE-2023-30774
A vulnerability was found in the libtiff library. This flaw causes a heap buffer overflow issue via the TIFFTAG_INKNAMES and TIFFTAG_NUMBEROFINKS values.
- 20231025 APPLE-SA-10-25-2023-4 macOS Sonoma 14.1
- https://access.redhat.com/security/cve/CVE-2023-30774
- https://bugzilla.redhat.com/show_bug.cgi?id=2187139
- https://gitlab.com/libtiff/libtiff/-/issues/463
- https://security.netapp.com/advisory/ntap-20230703-0002/
- https://support.apple.com/kb/HT213984
- 20231025 APPLE-SA-10-25-2023-4 macOS Sonoma 14.1
- https://support.apple.com/kb/HT213984
- https://security.netapp.com/advisory/ntap-20230703-0002/
- https://gitlab.com/libtiff/libtiff/-/issues/463
- https://bugzilla.redhat.com/show_bug.cgi?id=2187139
- https://access.redhat.com/security/cve/CVE-2023-30774
Modified: 2025-01-21
CVE-2023-30775
A vulnerability was found in the libtiff library. This security flaw causes a heap buffer overflow in extractContigSamples32bits, tiffcrop.c.
- https://access.redhat.com/security/cve/CVE-2023-30775
- https://access.redhat.com/security/cve/CVE-2023-30775
- https://bugzilla.redhat.com/show_bug.cgi?id=2187141
- https://bugzilla.redhat.com/show_bug.cgi?id=2187141
- https://gitlab.com/libtiff/libtiff/-/issues/464
- https://gitlab.com/libtiff/libtiff/-/issues/464
- https://security.netapp.com/advisory/ntap-20230703-0002/
- https://security.netapp.com/advisory/ntap-20230703-0002/
Modified: 2024-11-21
CVE-2023-3164
A heap-buffer-overflow vulnerability was found in LibTIFF, in extractImageSection() at tools/tiffcrop.c:7916 and tools/tiffcrop.c:7801. This flaw allows attackers to cause a denial of service via a crafted tiff file.
Modified: 2025-02-13
CVE-2023-3316
A NULL pointer dereference in TIFFClose() is caused by a failure to open an output file (non-existent path or a path that requires permissions like /dev/null) while specifying zones.
- https://gitlab.com/libtiff/libtiff/-/issues/515
- https://gitlab.com/libtiff/libtiff/-/issues/515
- https://gitlab.com/libtiff/libtiff/-/merge_requests/468
- https://gitlab.com/libtiff/libtiff/-/merge_requests/468
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://research.jfrog.com/vulnerabilities/libtiff-nullderef-dos-xray-522144/
- https://research.jfrog.com/vulnerabilities/libtiff-nullderef-dos-xray-522144/
Modified: 2024-11-21
CVE-2023-3576
A memory leak flaw was found in Libtiff's tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service.
Modified: 2024-11-21
CVE-2023-3618
A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to a buffer overflow in the Fax3Encode function in libtiff/tif_fax3.c, resulting in a denial of service.
- https://access.redhat.com/security/cve/CVE-2023-3618
- https://access.redhat.com/security/cve/CVE-2023-3618
- RHBZ#2215865
- RHBZ#2215865
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://security.netapp.com/advisory/ntap-20230824-0012/
- https://security.netapp.com/advisory/ntap-20230824-0012/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214037
- https://support.apple.com/kb/HT214038
- https://support.apple.com/kb/HT214038
Modified: 2024-11-21
CVE-2023-40745
LibTIFF is vulnerable to an integer overflow. This flaw allows remote attackers to cause a denial of service (application crash) or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
Modified: 2024-12-04
CVE-2023-41175
A vulnerability was found in libtiff due to multiple potential integer overflows in raw2tiff.c. This flaw allows remote attackers to cause a denial of service or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
Modified: 2024-11-21
CVE-2023-52356
A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service.
- http://seclists.org/fulldisclosure/2024/Jul/16
- http://seclists.org/fulldisclosure/2024/Jul/17
- http://seclists.org/fulldisclosure/2024/Jul/18
- http://seclists.org/fulldisclosure/2024/Jul/19
- http://seclists.org/fulldisclosure/2024/Jul/20
- http://seclists.org/fulldisclosure/2024/Jul/21
- http://seclists.org/fulldisclosure/2024/Jul/22
- http://seclists.org/fulldisclosure/2024/Jul/23
- RHSA-2024:5079
- https://access.redhat.com/security/cve/CVE-2023-52356
- https://access.redhat.com/security/cve/CVE-2023-52356
- RHBZ#2251344
- RHBZ#2251344
- https://gitlab.com/libtiff/libtiff/-/issues/622
- https://gitlab.com/libtiff/libtiff/-/issues/622
- https://gitlab.com/libtiff/libtiff/-/merge_requests/546
- https://gitlab.com/libtiff/libtiff/-/merge_requests/546
- https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html
- https://support.apple.com/kb/HT214116
- https://support.apple.com/kb/HT214117
- https://support.apple.com/kb/HT214118
- https://support.apple.com/kb/HT214119
- https://support.apple.com/kb/HT214120
- https://support.apple.com/kb/HT214122
- https://support.apple.com/kb/HT214123
- https://support.apple.com/kb/HT214124
Modified: 2024-11-21
CVE-2023-6228
An issue was found in the tiffcp utility distributed by the libtiff package where a crafted TIFF file on processing may cause a heap-based buffer overflow leads to an application crash.
Modified: 2024-11-21
CVE-2023-6277
An out-of-memory flaw was found in libtiff. Passing a crafted tiff file to TIFFOpen() API may allow a remote attacker to cause a denial of service via a craft input with size smaller than 379 KB.
- http://seclists.org/fulldisclosure/2024/Jul/16
- http://seclists.org/fulldisclosure/2024/Jul/17
- http://seclists.org/fulldisclosure/2024/Jul/18
- http://seclists.org/fulldisclosure/2024/Jul/19
- http://seclists.org/fulldisclosure/2024/Jul/20
- http://seclists.org/fulldisclosure/2024/Jul/21
- http://seclists.org/fulldisclosure/2024/Jul/22
- http://seclists.org/fulldisclosure/2024/Jul/23
- https://access.redhat.com/security/cve/CVE-2023-6277
- https://access.redhat.com/security/cve/CVE-2023-6277
- RHBZ#2251311
- RHBZ#2251311
- https://gitlab.com/libtiff/libtiff/-/issues/614
- https://gitlab.com/libtiff/libtiff/-/issues/614
- https://gitlab.com/libtiff/libtiff/-/merge_requests/545
- https://gitlab.com/libtiff/libtiff/-/merge_requests/545
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJIN6DTSL3VODZUGWEUXLEL5DR53EZMV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y7ZGN2MZXJ6E57W3L4YBM3ZPAU3T7T5C/
- https://security.netapp.com/advisory/ntap-20240119-0002/
- https://support.apple.com/kb/HT214116
- https://support.apple.com/kb/HT214117
- https://support.apple.com/kb/HT214118
- https://support.apple.com/kb/HT214119
- https://support.apple.com/kb/HT214120
- https://support.apple.com/kb/HT214122
- https://support.apple.com/kb/HT214123
- https://support.apple.com/kb/HT214124
Modified: 2024-11-21
CVE-2024-7006
A null pointer dereference flaw was found in Libtiff via `tif_dirinfo.c`. This issue may allow an attacker to trigger memory allocation failures through certain means, such as restricting the heap space size or injecting faults, causing a segmentation fault. This can cause an application crash, eventually leading to a denial of service.
Closed bugs
URL пакета устарел
URL пакета устарел
Нарушение GPL в libtiff, слинкованном с libjbig