Lucene search

K
almalinuxAlmaLinuxALSA-2022:8194
HistoryNov 15, 2022 - 12:00 a.m.

Moderate: libtiff security update

2022-11-1500:00:00
errata.almalinux.org
22
libtiff
security fix
denial of service
heap buffer overflow
out-of-bounds read
stack-buffer-overflow
cve-2022-0561
cve-2022-0562
cve-2022-0865
cve-2022-0924
cve-2022-1355
cve-2022-22844
cve-2022-0891
cve-2022-0908
cve-2022-0909
cve-2022-1354

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:N/A:P

CVSS3

7.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

EPSS

0.009

Percentile

82.9%

The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.

Security Fix(es):

  • libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561)
  • libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562)
  • libtiff: reachable assertion (CVE-2022-0865)
  • libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924)
  • libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355)
  • libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844)
  • libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891)
  • tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908)
  • tiff: Divide By Zero error in tiffcrop (CVE-2022-0909)
  • libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c (CVE-2022-1354)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.

References

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:N/A:P

CVSS3

7.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

EPSS

0.009

Percentile

82.9%