Описание
LibTIFF 4.3.0 has an out-of-bounds read in _TIFFmemcpy in tif_unix.c in certain situations involving a custom tag and 0x0200 as the second word of the DE field.
LibTIFF 4.3.0 has an out-of-bounds read in _TIFFmemcpy in tif_unix.c in certain situations involving a custom tag and 0x0200 as the second word of the DE field.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2022-22844
- https://gitlab.com/libtiff/libtiff/-/issues/355
- https://gitlab.com/libtiff/libtiff/-/merge_requests/287
- https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
- https://security.gentoo.org/glsa/202210-10
- https://security.netapp.com/advisory/ntap-20220311-0002
- https://www.debian.org/security/2022/dsa-5108
Связанные уязвимости
LibTIFF 4.3.0 has an out-of-bounds read in _TIFFmemcpy in tif_unix.c in certain situations involving a custom tag and 0x0200 as the second word of the DE field.
LibTIFF 4.3.0 has an out-of-bounds read in _TIFFmemcpy in tif_unix.c in certain situations involving a custom tag and 0x0200 as the second word of the DE field.
LibTIFF 4.3.0 has an out-of-bounds read in _TIFFmemcpy in tif_unix.c in certain situations involving a custom tag and 0x0200 as the second word of the DE field.
LibTIFF 4.3.0 has an out-of-bounds read in _TIFFmemcpy in tif_unix.c i ...