Описание
Moderate: libtiff security update
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
-
libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561)
-
libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562)
-
libtiff: reachable assertion (CVE-2022-0865)
-
libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924)
-
libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355)
-
libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844)
-
libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891)
-
tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908)
-
tiff: Divide By Zero error in tiffcrop (CVE-2022-0909)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
Затронутые продукты
Rocky Linux 8
Ссылки на источники
Исправления
- Red Hat - 2042603
- Red Hat - 2054494
- Red Hat - 2054495
- Red Hat - 2064145
- Red Hat - 2064146
- Red Hat - 2064148
- Red Hat - 2064406
- Red Hat - 2064411
- Red Hat - 2074415
Связанные уязвимости
Null source pointer passed as an argument to memcpy() function within TIFFFetchStripThing() in tif_dirread.c in libtiff versions from 3.9.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources, the fix is available with commit eecb0712.