CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
EPSS
Percentile
82.9%
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
almalinux | 9 | i686 | libtiff | < 4.4.0-2.el9 | libtiff-4.4.0-2.el9.i686.rpm |
almalinux | 9 | i686 | libtiff-devel | < 4.4.0-2.el9 | libtiff-devel-4.4.0-2.el9.i686.rpm |
almalinux | 9 | aarch64 | libtiff-devel | < 4.4.0-2.el9 | libtiff-devel-4.4.0-2.el9.aarch64.rpm |
almalinux | 9 | aarch64 | libtiff | < 4.4.0-2.el9 | libtiff-4.4.0-2.el9.aarch64.rpm |
almalinux | 9 | x86_64 | libtiff-devel | < 4.4.0-2.el9 | libtiff-devel-4.4.0-2.el9.x86_64.rpm |
almalinux | 9 | x86_64 | libtiff | < 4.4.0-2.el9 | libtiff-4.4.0-2.el9.x86_64.rpm |
almalinux | 9 | s390x | libtiff-devel | < 4.4.0-2.el9 | libtiff-devel-4.4.0-2.el9.s390x.rpm |
almalinux | 9 | s390x | libtiff | < 4.4.0-2.el9 | libtiff-4.4.0-2.el9.s390x.rpm |
almalinux | 9 | ppc64le | libtiff-devel | < 4.4.0-2.el9 | libtiff-devel-4.4.0-2.el9.ppc64le.rpm |
almalinux | 9 | ppc64le | libtiff | < 4.4.0-2.el9 | libtiff-4.4.0-2.el9.ppc64le.rpm |
access.redhat.com/errata/RHSA-2022:8194
access.redhat.com/security/cve/CVE-2022-0561
access.redhat.com/security/cve/CVE-2022-0562
access.redhat.com/security/cve/CVE-2022-0865
access.redhat.com/security/cve/CVE-2022-0891
access.redhat.com/security/cve/CVE-2022-0908
access.redhat.com/security/cve/CVE-2022-0909
access.redhat.com/security/cve/CVE-2022-0924
access.redhat.com/security/cve/CVE-2022-1354
access.redhat.com/security/cve/CVE-2022-1355
access.redhat.com/security/cve/CVE-2022-22844
bugzilla.redhat.com/2042603
bugzilla.redhat.com/2054494
bugzilla.redhat.com/2054495
bugzilla.redhat.com/2064145
bugzilla.redhat.com/2064146
bugzilla.redhat.com/2064148
bugzilla.redhat.com/2064406
bugzilla.redhat.com/2064411
bugzilla.redhat.com/2074404
bugzilla.redhat.com/2074415
errata.almalinux.org/9/ALSA-2022-8194.html
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
EPSS
Percentile
82.9%