LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c:346 when called from extractImageSection, tools/tiffcrop.c:6860, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
CPE | Name | Operator | Version |
---|---|---|---|
debian_linux | eq | 10.0 | |
debian_linux | eq | 11.0 | |
libtiff | le | 4.4.0 |
gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3627.json
gitlab.com/libtiff/libtiff/-/commit/236b7191f04c60d09ee836ae13b50f812c841047
gitlab.com/libtiff/libtiff/-/issues/411
lists.debian.org/debian-lts-announce/2023/01/msg00018.html
security.netapp.com/advisory/ntap-20230110-0001/
www.debian.org/security/2023/dsa-5333