Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-1354 (GCVE-0-2022-1354)
Vulnerability from cvelistv5
- CWE-125 - - Out-of-bounds Read.
{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T00:03:06.284Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074404"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.com/libtiff/libtiff/-/issues/319"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://access.redhat.com/security/cve/CVE-2022-1354"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20221014-0007/"
          },
          {
            "name": "GLSA-202210-10",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202210-10"
          },
          {
            "name": "[debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html"
          },
          {
            "name": "DSA-5333",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5333"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "libtiff",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Not-Known"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A heap buffer overflow flaw was found in Libtiffs\u0027 tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-125",
              "description": "CWE-125 - Out-of-bounds Read.",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-30T00:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074404"
        },
        {
          "url": "https://gitlab.com/libtiff/libtiff/-/issues/319"
        },
        {
          "url": "https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798"
        },
        {
          "url": "https://access.redhat.com/security/cve/CVE-2022-1354"
        },
        {
          "url": "https://security.netapp.com/advisory/ntap-20221014-0007/"
        },
        {
          "name": "GLSA-202210-10",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.gentoo.org/glsa/202210-10"
        },
        {
          "name": "[debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html"
        },
        {
          "name": "DSA-5333",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.debian.org/security/2023/dsa-5333"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2022-1354",
    "datePublished": "2022-08-31T00:00:00",
    "dateReserved": "2022-04-14T00:00:00",
    "dateUpdated": "2024-08-03T00:03:06.284Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-1354\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2022-08-31T16:15:09.520\",\"lastModified\":\"2024-11-21T06:40:33.447\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A heap buffer overflow flaw was found in Libtiffs\u0027 tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service.\"},{\"lang\":\"es\",\"value\":\"Se ha encontrado un fallo de desbordamiento del b\u00fafer de la pila en el archivo tiffinfo.c de Libtiffs, en la funci\u00f3n TIFFReadRawDataStriped(). Este defecto permite a un atacante pasar un archivo TIFF dise\u00f1ado a la herramienta tiffinfo, desencadenando un problema de desbordamiento del b\u00fafer de la pila y causando un fallo que conlleva a una denegaci\u00f3n de servicio\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.4.0\",\"matchCriteriaId\":\"089A82D2-D7BA-42E9-961F-A61E72537850\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F6FB57C-2BC7-487C-96DD-132683AEB35D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7CF3019-975D-40BB-A8A4-894E62BD3797\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/security/cve/CVE-2022-1354\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2074404\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://gitlab.com/libtiff/libtiff/-/issues/319\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202210-10\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20221014-0007/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5333\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/CVE-2022-1354\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2074404\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://gitlab.com/libtiff/libtiff/-/issues/319\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202210-10\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20221014-0007/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5333\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
  }
}
  rhsa-2022:8194
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for libtiff is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.\n\nSecurity Fix(es):\n\n* libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561)\n\n* libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562)\n\n* libtiff: reachable assertion (CVE-2022-0865)\n\n* libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924)\n\n* libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355)\n\n* libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844)\n\n* libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891)\n\n* tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908)\n\n* tiff: Divide By Zero error in tiffcrop (CVE-2022-0909)\n\n* libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c (CVE-2022-1354)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:8194",
        "url": "https://access.redhat.com/errata/RHSA-2022:8194"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index"
      },
      {
        "category": "external",
        "summary": "2042603",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042603"
      },
      {
        "category": "external",
        "summary": "2054494",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054494"
      },
      {
        "category": "external",
        "summary": "2054495",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054495"
      },
      {
        "category": "external",
        "summary": "2064145",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064145"
      },
      {
        "category": "external",
        "summary": "2064146",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064146"
      },
      {
        "category": "external",
        "summary": "2064148",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064148"
      },
      {
        "category": "external",
        "summary": "2064406",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064406"
      },
      {
        "category": "external",
        "summary": "2064411",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064411"
      },
      {
        "category": "external",
        "summary": "2074404",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074404"
      },
      {
        "category": "external",
        "summary": "2074415",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_8194.json"
      }
    ],
    "title": "Red Hat Security Advisory: libtiff security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:53:45+00:00",
      "generator": {
        "date": "2025-10-09T21:53:45+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:8194",
      "initial_release_date": "2022-11-15T15:17:35+00:00",
      "revision_history": [
        {
          "date": "2022-11-15T15:17:35+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-11-15T15:17:35+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:53:45+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.1.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder (v. 9)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder (v. 9)",
                  "product_id": "CRB-9.1.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.src",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.src",
                  "product_id": "libtiff-0:4.4.0-2.el9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-tools-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-2.el9?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-tools-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-2.el9?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-tools-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-2.el9?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.src",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.src",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-0561",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-02-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2054494"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in libtiff where a NULL source pointer passed as an argument to the memcpy() function within the TIFFFetchStripThing() in tif_dirread.c. This flaw allows an attacker with a crafted TIFF file to exploit this flaw, causing a crash and leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Denial of Service via crafted TIFF file",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0561"
        },
        {
          "category": "external",
          "summary": "RHBZ#2054494",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054494"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0561",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0561",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0561"
        }
      ],
      "release_date": "2022-02-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Denial of Service via crafted TIFF file"
    },
    {
      "cve": "CVE-2022-0562",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-02-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2054495"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in libtiff where a NULL source pointer passed as an argument to the memcpy() function within the TIFFReadDirectory() in tif_dirread.c. This flaw allows an attacker to exploit this vulnerability via a crafted TIFF file, causing a crash and leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Null source pointer lead to Denial of Service via crafted TIFF file",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0562"
        },
        {
          "category": "external",
          "summary": "RHBZ#2054495",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054495"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0562",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0562",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0562"
        }
      ],
      "release_date": "2022-02-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Null source pointer lead to Denial of Service via crafted TIFF file"
    },
    {
      "cve": "CVE-2022-0865",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064406"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A reachable assertion failure was found in libtiff\u0027s JBIG functionality. This flaw allows an attacker who can submit a crafted file to an application linked with libtiff and using the JBIG functionality, causes a crash via an assertion failure, leading to a denial of service. The exact mechanism and conditions around this issue are dependent on how the application uses libtiff.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: reachable assertion",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0865"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064406",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064406"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0865",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0865",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0865"
        }
      ],
      "release_date": "2022-03-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        },
        {
          "category": "workaround",
          "details": "Applications that do not parse files from untrusted/malicious sources will not be affected by this vulnerability.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: reachable assertion"
    },
    {
      "cve": "CVE-2022-0891",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064411"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap buffer overflow in ExtractImageSection function in tiffcrop.c in libtiff library Version 4.3.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: heap buffer overflow in extractImageSection",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The severity of this flaw was changed to Low because it is an out-of-bounds read of 1 byte and in the tiffcrop tool rather than in the library.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0891"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064411",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064411"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0891",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0891"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0891",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0891"
        }
      ],
      "release_date": "2022-02-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "libtiff: heap buffer overflow in extractImageSection"
    },
    {
      "cve": "CVE-2022-0908",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064145"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in LibTIFF where a NULL source pointer passed as an argument to the memcpy() function within the TIFFFetchNormalTag() in tif_dirread.c. This flaw allows an attacker with a crafted TIFF file to cause a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0908"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064145",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064145"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0908",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0908",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0908"
        }
      ],
      "release_date": "2022-03-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c"
    },
    {
      "cve": "CVE-2022-0909",
      "cwe": {
        "id": "CWE-369",
        "name": "Divide By Zero"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064146"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A floating-point exception (FPE) flaw was found in LibTIFF\u2019s computeOutputPixelOffsets() function in tiffcrop.c file. This flaw allows an attacker with a crafted TIFF file to trigger a divide-by-zero error, causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tiff: Divide By Zero error in tiffcrop",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0909"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064146",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064146"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0909",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0909",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0909"
        }
      ],
      "release_date": "2022-03-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tiff: Divide By Zero error in tiffcrop"
    },
    {
      "cve": "CVE-2022-0924",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064148"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap buffer overflow flaw was found in Libtiffs\u0027 cpContigBufToSeparateBuf() function of the tiffcp.c file. This flaw allows an attacker with a crafted TIFF file to trigger a heap out-of-bounds read access issue, causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Out-of-bounds Read error in tiffcp",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "All versions of Libtiff shipped in Red Hat Enterprise Linux are affected, because of the presence of vulnerable code in our code-base.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and since Red Hat Enterprise Linux 6, 7 are Out-of-Support-Scope, the issue is not currently planned to be addressed in future updates. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0924"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064148",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064148"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0924",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0924",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0924"
        }
      ],
      "release_date": "2022-03-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Out-of-bounds Read error in tiffcp"
    },
    {
      "cve": "CVE-2022-1354",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2074404"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap buffer overflow flaw was found in Libtiffs\u0027 tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "In order to successfully exploit this vulberability, the attacker needs to create a specially crafted TIFF file designed to exploit the buffer overflow in the TIFFReadRawDataStriped() function. The attacker must then convince or trick a user into processing the malicious TIFF file using the tiffinfo tool.\n\nConsidering the high bar of prerequisites for successful exploitation, RH ProdSec has set the Impact of this vulnerability to \"Low\"",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1354"
        },
        {
          "category": "external",
          "summary": "RHBZ#2074404",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074404"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1354",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1354",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1354"
        }
      ],
      "release_date": "2022-04-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c"
    },
    {
      "cve": "CVE-2022-1355",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "discovery_date": "2022-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2074415"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack buffer overflow flaw was found in Libtiffs\u0027 tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: stack-buffer-overflow in tiffcp.c in main()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1355"
        },
        {
          "category": "external",
          "summary": "RHBZ#2074415",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1355",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1355",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1355"
        }
      ],
      "release_date": "2022-04-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: stack-buffer-overflow in tiffcp.c in main()"
    },
    {
      "cve": "CVE-2022-22844",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-01-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2042603"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer overflow vulnerability was found in libtiff. This flaw allows an attacker with network access to pass specially crafted files, causing an application to halt or crash. The root cause of this issue was from the memcpy function in tif_unix.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-22844"
        },
        {
          "category": "external",
          "summary": "RHBZ#2042603",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042603"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22844",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22844",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22844"
        }
      ],
      "release_date": "2022-01-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c"
    }
  ]
}
  RHSA-2022:8194
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for libtiff is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.\n\nSecurity Fix(es):\n\n* libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561)\n\n* libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562)\n\n* libtiff: reachable assertion (CVE-2022-0865)\n\n* libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924)\n\n* libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355)\n\n* libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844)\n\n* libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891)\n\n* tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908)\n\n* tiff: Divide By Zero error in tiffcrop (CVE-2022-0909)\n\n* libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c (CVE-2022-1354)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:8194",
        "url": "https://access.redhat.com/errata/RHSA-2022:8194"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index"
      },
      {
        "category": "external",
        "summary": "2042603",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042603"
      },
      {
        "category": "external",
        "summary": "2054494",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054494"
      },
      {
        "category": "external",
        "summary": "2054495",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054495"
      },
      {
        "category": "external",
        "summary": "2064145",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064145"
      },
      {
        "category": "external",
        "summary": "2064146",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064146"
      },
      {
        "category": "external",
        "summary": "2064148",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064148"
      },
      {
        "category": "external",
        "summary": "2064406",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064406"
      },
      {
        "category": "external",
        "summary": "2064411",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064411"
      },
      {
        "category": "external",
        "summary": "2074404",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074404"
      },
      {
        "category": "external",
        "summary": "2074415",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_8194.json"
      }
    ],
    "title": "Red Hat Security Advisory: libtiff security update",
    "tracking": {
      "current_release_date": "2025-10-09T21:53:45+00:00",
      "generator": {
        "date": "2025-10-09T21:53:45+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2022:8194",
      "initial_release_date": "2022-11-15T15:17:35+00:00",
      "revision_history": [
        {
          "date": "2022-11-15T15:17:35+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-11-15T15:17:35+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T21:53:45+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.1.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder (v. 9)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder (v. 9)",
                  "product_id": "CRB-9.1.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.src",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.src",
                  "product_id": "libtiff-0:4.4.0-2.el9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-tools-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-2.el9?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-tools-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-2.el9?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-tools-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-2.el9?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.src",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.src",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-0561",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-02-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2054494"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in libtiff where a NULL source pointer passed as an argument to the memcpy() function within the TIFFFetchStripThing() in tif_dirread.c. This flaw allows an attacker with a crafted TIFF file to exploit this flaw, causing a crash and leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Denial of Service via crafted TIFF file",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0561"
        },
        {
          "category": "external",
          "summary": "RHBZ#2054494",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054494"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0561",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0561",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0561"
        }
      ],
      "release_date": "2022-02-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Denial of Service via crafted TIFF file"
    },
    {
      "cve": "CVE-2022-0562",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-02-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2054495"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in libtiff where a NULL source pointer passed as an argument to the memcpy() function within the TIFFReadDirectory() in tif_dirread.c. This flaw allows an attacker to exploit this vulnerability via a crafted TIFF file, causing a crash and leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Null source pointer lead to Denial of Service via crafted TIFF file",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0562"
        },
        {
          "category": "external",
          "summary": "RHBZ#2054495",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054495"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0562",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0562",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0562"
        }
      ],
      "release_date": "2022-02-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Null source pointer lead to Denial of Service via crafted TIFF file"
    },
    {
      "cve": "CVE-2022-0865",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064406"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A reachable assertion failure was found in libtiff\u0027s JBIG functionality. This flaw allows an attacker who can submit a crafted file to an application linked with libtiff and using the JBIG functionality, causes a crash via an assertion failure, leading to a denial of service. The exact mechanism and conditions around this issue are dependent on how the application uses libtiff.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: reachable assertion",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0865"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064406",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064406"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0865",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0865",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0865"
        }
      ],
      "release_date": "2022-03-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        },
        {
          "category": "workaround",
          "details": "Applications that do not parse files from untrusted/malicious sources will not be affected by this vulnerability.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: reachable assertion"
    },
    {
      "cve": "CVE-2022-0891",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064411"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap buffer overflow in ExtractImageSection function in tiffcrop.c in libtiff library Version 4.3.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: heap buffer overflow in extractImageSection",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The severity of this flaw was changed to Low because it is an out-of-bounds read of 1 byte and in the tiffcrop tool rather than in the library.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0891"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064411",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064411"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0891",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0891"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0891",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0891"
        }
      ],
      "release_date": "2022-02-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "libtiff: heap buffer overflow in extractImageSection"
    },
    {
      "cve": "CVE-2022-0908",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064145"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in LibTIFF where a NULL source pointer passed as an argument to the memcpy() function within the TIFFFetchNormalTag() in tif_dirread.c. This flaw allows an attacker with a crafted TIFF file to cause a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0908"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064145",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064145"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0908",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0908",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0908"
        }
      ],
      "release_date": "2022-03-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c"
    },
    {
      "cve": "CVE-2022-0909",
      "cwe": {
        "id": "CWE-369",
        "name": "Divide By Zero"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064146"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A floating-point exception (FPE) flaw was found in LibTIFF\u2019s computeOutputPixelOffsets() function in tiffcrop.c file. This flaw allows an attacker with a crafted TIFF file to trigger a divide-by-zero error, causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tiff: Divide By Zero error in tiffcrop",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0909"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064146",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064146"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0909",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0909",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0909"
        }
      ],
      "release_date": "2022-03-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tiff: Divide By Zero error in tiffcrop"
    },
    {
      "cve": "CVE-2022-0924",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064148"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap buffer overflow flaw was found in Libtiffs\u0027 cpContigBufToSeparateBuf() function of the tiffcp.c file. This flaw allows an attacker with a crafted TIFF file to trigger a heap out-of-bounds read access issue, causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Out-of-bounds Read error in tiffcp",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "All versions of Libtiff shipped in Red Hat Enterprise Linux are affected, because of the presence of vulnerable code in our code-base.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and since Red Hat Enterprise Linux 6, 7 are Out-of-Support-Scope, the issue is not currently planned to be addressed in future updates. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0924"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064148",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064148"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0924",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0924",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0924"
        }
      ],
      "release_date": "2022-03-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Out-of-bounds Read error in tiffcp"
    },
    {
      "cve": "CVE-2022-1354",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2074404"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap buffer overflow flaw was found in Libtiffs\u0027 tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "In order to successfully exploit this vulberability, the attacker needs to create a specially crafted TIFF file designed to exploit the buffer overflow in the TIFFReadRawDataStriped() function. The attacker must then convince or trick a user into processing the malicious TIFF file using the tiffinfo tool.\n\nConsidering the high bar of prerequisites for successful exploitation, RH ProdSec has set the Impact of this vulnerability to \"Low\"",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1354"
        },
        {
          "category": "external",
          "summary": "RHBZ#2074404",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074404"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1354",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1354",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1354"
        }
      ],
      "release_date": "2022-04-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c"
    },
    {
      "cve": "CVE-2022-1355",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "discovery_date": "2022-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2074415"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack buffer overflow flaw was found in Libtiffs\u0027 tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: stack-buffer-overflow in tiffcp.c in main()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1355"
        },
        {
          "category": "external",
          "summary": "RHBZ#2074415",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1355",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1355",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1355"
        }
      ],
      "release_date": "2022-04-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: stack-buffer-overflow in tiffcp.c in main()"
    },
    {
      "cve": "CVE-2022-22844",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-01-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2042603"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer overflow vulnerability was found in libtiff. This flaw allows an attacker with network access to pass specially crafted files, causing an application to halt or crash. The root cause of this issue was from the memcpy function in tif_unix.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-22844"
        },
        {
          "category": "external",
          "summary": "RHBZ#2042603",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042603"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22844",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22844",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22844"
        }
      ],
      "release_date": "2022-01-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c"
    }
  ]
}
  rhsa-2022_8194
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for libtiff is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.\n\nSecurity Fix(es):\n\n* libtiff: Denial of Service via crafted TIFF file (CVE-2022-0561)\n\n* libtiff: Null source pointer lead to Denial of Service via crafted TIFF file (CVE-2022-0562)\n\n* libtiff: reachable assertion (CVE-2022-0865)\n\n* libtiff: Out-of-bounds Read error in tiffcp (CVE-2022-0924)\n\n* libtiff: stack-buffer-overflow in tiffcp.c in main() (CVE-2022-1355)\n\n* libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c (CVE-2022-22844)\n\n* libtiff: heap buffer overflow in extractImageSection (CVE-2022-0891)\n\n* tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c (CVE-2022-0908)\n\n* tiff: Divide By Zero error in tiffcrop (CVE-2022-0909)\n\n* libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c (CVE-2022-1354)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:8194",
        "url": "https://access.redhat.com/errata/RHSA-2022:8194"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index"
      },
      {
        "category": "external",
        "summary": "2042603",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042603"
      },
      {
        "category": "external",
        "summary": "2054494",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054494"
      },
      {
        "category": "external",
        "summary": "2054495",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054495"
      },
      {
        "category": "external",
        "summary": "2064145",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064145"
      },
      {
        "category": "external",
        "summary": "2064146",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064146"
      },
      {
        "category": "external",
        "summary": "2064148",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064148"
      },
      {
        "category": "external",
        "summary": "2064406",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064406"
      },
      {
        "category": "external",
        "summary": "2064411",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064411"
      },
      {
        "category": "external",
        "summary": "2074404",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074404"
      },
      {
        "category": "external",
        "summary": "2074415",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_8194.json"
      }
    ],
    "title": "Red Hat Security Advisory: libtiff security update",
    "tracking": {
      "current_release_date": "2024-12-18T15:17:06+00:00",
      "generator": {
        "date": "2024-12-18T15:17:06+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.3"
        }
      },
      "id": "RHSA-2022:8194",
      "initial_release_date": "2022-11-15T15:17:35+00:00",
      "revision_history": [
        {
          "date": "2022-11-15T15:17:35+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-11-15T15:17:35+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-12-18T15:17:06+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.1.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder (v. 9)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder (v. 9)",
                  "product_id": "CRB-9.1.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.src",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.src",
                  "product_id": "libtiff-0:4.4.0-2.el9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-2.el9.aarch64",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-2.el9.aarch64",
                  "product_id": "libtiff-tools-0:4.4.0-2.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-2.el9?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
                  "product_id": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-2.el9?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-2.el9.x86_64",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-2.el9.x86_64",
                  "product_id": "libtiff-tools-0:4.4.0-2.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-2.el9?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-devel-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-2.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-2.el9.s390x",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-2.el9.s390x",
                  "product_id": "libtiff-tools-0:4.4.0-2.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-2.el9?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.src",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.src",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
        "relates_to_product_reference": "CRB-9.1.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-0561",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-02-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2054494"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in libtiff where a NULL source pointer passed as an argument to the memcpy() function within the TIFFFetchStripThing() in tif_dirread.c. This flaw allows an attacker with a crafted TIFF file to exploit this flaw, causing a crash and leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Denial of Service via crafted TIFF file",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0561"
        },
        {
          "category": "external",
          "summary": "RHBZ#2054494",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054494"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0561",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0561",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0561"
        }
      ],
      "release_date": "2022-02-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Denial of Service via crafted TIFF file"
    },
    {
      "cve": "CVE-2022-0562",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-02-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2054495"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in libtiff where a NULL source pointer passed as an argument to the memcpy() function within the TIFFReadDirectory() in tif_dirread.c. This flaw allows an attacker to exploit this vulnerability via a crafted TIFF file, causing a crash and leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Null source pointer lead to Denial of Service via crafted TIFF file",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0562"
        },
        {
          "category": "external",
          "summary": "RHBZ#2054495",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054495"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0562",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0562",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0562"
        }
      ],
      "release_date": "2022-02-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Null source pointer lead to Denial of Service via crafted TIFF file"
    },
    {
      "cve": "CVE-2022-0865",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064406"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A reachable assertion failure was found in libtiff\u0027s JBIG functionality. This flaw allows an attacker who can submit a crafted file to an application linked with libtiff and using the JBIG functionality, causes a crash via an assertion failure, leading to a denial of service. The exact mechanism and conditions around this issue are dependent on how the application uses libtiff.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: reachable assertion",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0865"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064406",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064406"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0865",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0865",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0865"
        }
      ],
      "release_date": "2022-03-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        },
        {
          "category": "workaround",
          "details": "Applications that do not parse files from untrusted/malicious sources will not be affected by this vulnerability.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: reachable assertion"
    },
    {
      "cve": "CVE-2022-0891",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064411"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap buffer overflow in ExtractImageSection function in tiffcrop.c in libtiff library Version 4.3.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: heap buffer overflow in extractImageSection",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The severity of this flaw was changed to Low because it is an out-of-bounds read of 1 byte and in the tiffcrop tool rather than in the library.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0891"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064411",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064411"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0891",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0891"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0891",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0891"
        }
      ],
      "release_date": "2022-02-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "libtiff: heap buffer overflow in extractImageSection"
    },
    {
      "cve": "CVE-2022-0908",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064145"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in LibTIFF where a NULL source pointer passed as an argument to the memcpy() function within the TIFFFetchNormalTag() in tif_dirread.c. This flaw allows an attacker with a crafted TIFF file to cause a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0908"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064145",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064145"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0908",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0908",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0908"
        }
      ],
      "release_date": "2022-03-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c"
    },
    {
      "cve": "CVE-2022-0909",
      "cwe": {
        "id": "CWE-369",
        "name": "Divide By Zero"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064146"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A floating-point exception (FPE) flaw was found in LibTIFF\u2019s computeOutputPixelOffsets() function in tiffcrop.c file. This flaw allows an attacker with a crafted TIFF file to trigger a divide-by-zero error, causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tiff: Divide By Zero error in tiffcrop",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0909"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064146",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064146"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0909",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0909",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0909"
        }
      ],
      "release_date": "2022-03-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tiff: Divide By Zero error in tiffcrop"
    },
    {
      "cve": "CVE-2022-0924",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064148"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap buffer overflow flaw was found in Libtiffs\u0027 cpContigBufToSeparateBuf() function of the tiffcp.c file. This flaw allows an attacker with a crafted TIFF file to trigger a heap out-of-bounds read access issue, causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Out-of-bounds Read error in tiffcp",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "All versions of Libtiff shipped in Red Hat Enterprise Linux are affected, because of the presence of vulnerable code in our code-base.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and since Red Hat Enterprise Linux 6, 7 are Out-of-Support-Scope, the issue is not currently planned to be addressed in future updates. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0924"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064148",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064148"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0924",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0924",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0924"
        }
      ],
      "release_date": "2022-03-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Out-of-bounds Read error in tiffcp"
    },
    {
      "cve": "CVE-2022-1354",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2074404"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap buffer overflow flaw was found in Libtiffs\u0027 tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1354"
        },
        {
          "category": "external",
          "summary": "RHBZ#2074404",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074404"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1354",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1354",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1354"
        }
      ],
      "release_date": "2022-04-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c"
    },
    {
      "cve": "CVE-2022-1355",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "discovery_date": "2022-04-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2074415"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack buffer overflow flaw was found in Libtiffs\u0027 tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: stack-buffer-overflow in tiffcp.c in main()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1355"
        },
        {
          "category": "external",
          "summary": "RHBZ#2074415",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074415"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1355",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1355",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1355"
        }
      ],
      "release_date": "2022-04-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: stack-buffer-overflow in tiffcp.c in main()"
    },
    {
      "cve": "CVE-2022-22844",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-01-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2042603"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer overflow vulnerability was found in libtiff. This flaw allows an attacker with network access to pass specially crafted files, causing an application to halt or crash. The root cause of this issue was from the memcpy function in tif_unix.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
          "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
          "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-22844"
        },
        {
          "category": "external",
          "summary": "RHBZ#2042603",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042603"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22844",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22844",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22844"
        }
      ],
      "release_date": "2022-01-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-15T15:17:35+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:8194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "AppStream-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "AppStream-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.src",
            "CRB-9.1.0.GA:libtiff-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debuginfo-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-debugsource-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-devel-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-0:4.4.0-2.el9.x86_64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.aarch64",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.i686",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.ppc64le",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.s390x",
            "CRB-9.1.0.GA:libtiff-tools-debuginfo-0:4.4.0-2.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c"
    }
  ]
}
  cnvd-2022-72098
Vulnerability from cnvd
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798
| Name | Libtiff LibTiff <4.4.0 | 
|---|
{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2022-1354",
      "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2022-1354"
    }
  },
  "description": "LibTIFF\u662f\u4e00\u4e2a\u8bfb\u5199TIFF\uff08\u6807\u7b7e\u56fe\u50cf\u6587\u4ef6\u683c\u5f0f\uff09\u6587\u4ef6\u7684\u5e93\u3002\u8be5\u5e93\u5305\u542b\u4e00\u4e9b\u5904\u7406TIFF\u6587\u4ef6\u7684\u547d\u4ee4\u884c\u5de5\u5177\u3002\n\nLibTIFF\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5728tiffinfo.c\u7684TIFFReadRawDataStriped() \u51fd\u6570\u4e2d\u53d1\u73b0\u5b58\u5728\u5806\u7f13\u51b2\u533a\u6ea2\u51fa\u7f3a\u9677\u3002\u653b\u51fb\u8005\u5229\u7528\u8be5\u6f0f\u6d1e\u5c06\u7279\u5236\u7684TIFF\u6587\u4ef6\u4f20\u9012\u7ed9tiffinfo\u5de5\u5177\uff0c\u4ece\u800c\u89e6\u53d1\u5806\u7f13\u51b2\u533a\u6ea2\u51fa\u95ee\u9898\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2022-72098",
  "openTime": "2022-10-28",
  "patchDescription": "LibTIFF\u662f\u4e00\u4e2a\u8bfb\u5199TIFF\uff08\u6807\u7b7e\u56fe\u50cf\u6587\u4ef6\u683c\u5f0f\uff09\u6587\u4ef6\u7684\u5e93\u3002\u8be5\u5e93\u5305\u542b\u4e00\u4e9b\u5904\u7406TIFF\u6587\u4ef6\u7684\u547d\u4ee4\u884c\u5de5\u5177\u3002\r\n\r\nLibTIFF\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5728tiffinfo.c\u7684TIFFReadRawDataStriped() \u51fd\u6570\u4e2d\u53d1\u73b0\u5b58\u5728\u5806\u7f13\u51b2\u533a\u6ea2\u51fa\u7f3a\u9677\u3002\u653b\u51fb\u8005\u5229\u7528\u8be5\u6f0f\u6d1e\u5c06\u7279\u5236\u7684TIFF\u6587\u4ef6\u4f20\u9012\u7ed9tiffinfo\u5de5\u5177\uff0c\u4ece\u800c\u89e6\u53d1\u5806\u7f13\u51b2\u533a\u6ea2\u51fa\u95ee\u9898\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "LibTIFF\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2022-72098\uff09\u7684\u8865\u4e01",
  "products": {
    "product": "Libtiff LibTiff \u003c4.4.0"
  },
  "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2022-1354",
  "serverity": "\u4e2d",
  "submitTime": "2022-09-05",
  "title": "LibTIFF\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2022-72098\uff09"
}
  wid-sec-w-2022-1250
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "libTIFF ist ein Softwarepaket f\u00fcr die Verarbeitung von Bilddateien in Tag Image File Format (TIFF).",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in libTIFF ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- UNIX\n- Linux\n- Windows\n- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2022-1250 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1250.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2022-1250 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1250"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS2-2023-2055 vom 2023-06-05",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2055.html"
      },
      {
        "category": "external",
        "summary": "National Vulnerability Database - CVE-2022-2520 vom 2022-08-31",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2520"
      },
      {
        "category": "external",
        "summary": "National Vulnerability Database - CVE-2022-2520 vom 2022-08-31",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2521"
      },
      {
        "category": "external",
        "summary": "National Vulnerability Database - CVE-2022-2520 vom 2022-08-31",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1355"
      },
      {
        "category": "external",
        "summary": "National Vulnerability Database - CVE-2022-2520 vom 2022-08-31",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1354"
      },
      {
        "category": "external",
        "summary": "PoC",
        "url": "https://gitlab.com/libtiff/libtiff/-/issues/424"
      },
      {
        "category": "external",
        "summary": "PoC",
        "url": "https://gitlab.com/libtiff/libtiff/-/issues/422"
      },
      {
        "category": "external",
        "summary": "PoC",
        "url": "https://gitlab.com/libtiff/libtiff/-/issues/400"
      },
      {
        "category": "external",
        "summary": "PoC",
        "url": "https://gitlab.com/libtiff/libtiff/-/issues/319"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5619-1 vom 2022-09-20",
        "url": "https://ubuntu.com/security/notices/USN-5619-1"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:3679-1 vom 2022-10-20",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012592.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:3690-1 vom 2022-10-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012599.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2022-183 vom 2022-11-04",
        "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-183.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5714-1 vom 2022-11-08",
        "url": "https://ubuntu.com/security/notices/USN-5714-1"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:7585 vom 2022-11-08",
        "url": "https://access.redhat.com/errata/RHSA-2022:7585"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:8194 vom 2022-11-15",
        "url": "https://access.redhat.com/errata/RHSA-2022:8194"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2022-7585 vom 2022-11-15",
        "url": "https://linux.oracle.com/errata/ELSA-2022-7585.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2022-1891 vom 2022-12-07",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1891.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:8781 vom 2022-12-08",
        "url": "https://access.redhat.com/errata/RHSA-2022:8781"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2022-1644 vom 2022-12-10",
        "url": "https://alas.aws.amazon.com/ALAS-2022-1644.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-0095 vom 2023-01-12",
        "url": "https://linux.oracle.com/errata/ELSA-2023-0095.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-3278 vom 2023-01-20",
        "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-0302 vom 2023-01-24",
        "url": "https://linux.oracle.com/errata/ELSA-2023-0302.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:0302 vom 2023-01-23",
        "url": "https://access.redhat.com/errata/RHSA-2023:0302"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-5333 vom 2023-01-29",
        "url": "https://www.debian.org/security/2023/dsa-5333"
      }
    ],
    "source_lang": "en-US",
    "title": "libTIFF: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
    "tracking": {
      "current_release_date": "2023-06-05T22:00:00.000+00:00",
      "generator": {
        "date": "2024-08-15T17:34:21.452+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.5"
        }
      },
      "id": "WID-SEC-W-2022-1250",
      "initial_release_date": "2022-08-31T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2022-08-31T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2022-09-07T22:00:00.000+00:00",
          "number": "2",
          "summary": "Exploit aufgenommen"
        },
        {
          "date": "2022-09-19T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2022-10-20T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2022-10-23T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2022-11-06T23:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2022-11-07T23:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2022-11-08T23:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2022-11-15T23:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
        },
        {
          "date": "2022-12-06T23:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2022-12-07T23:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2022-12-11T23:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2023-01-12T23:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2023-01-22T23:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2023-01-23T23:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
        },
        {
          "date": "2023-01-29T23:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2023-06-05T22:00:00.000+00:00",
          "number": "17",
          "summary": "Neue Updates von Amazon aufgenommen"
        }
      ],
      "status": "final",
      "version": "17"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Debian Linux",
            "product": {
              "name": "Debian Linux",
              "product_id": "2951",
              "product_identification_helper": {
                "cpe": "cpe:/o:debian:debian_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Open Source libTIFF",
                "product": {
                  "name": "Open Source libTIFF",
                  "product_id": "T001217",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:libtiff:libtiff:-"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Open Source libTIFF 4.4.0rc1",
                "product": {
                  "name": "Open Source libTIFF 4.4.0rc1",
                  "product_id": "T024307",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:libtiff:libtiff:4.4.0rc1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "libTIFF"
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux",
            "product": {
              "name": "Red Hat Enterprise Linux",
              "product_id": "67646",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:enterprise_linux:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Red Hat OpenShift",
            "product": {
              "name": "Red Hat OpenShift",
              "product_id": "T008027",
              "product_identification_helper": {
                "cpe": "cpe:/a:redhat:openshift:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-1354",
      "notes": [
        {
          "category": "description",
          "text": "In libTIFF existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer fehlgeschlagenen sysmalloc-Assertion in rotateImage(), einer ung\u00fcltigen Zeigerfreigabeoperation in TIFFClose(), einem Stack-Puffer\u00fcberlauf in tiffcp.c in der Funktion main() und einem Heap-Puffer\u00fcberlauf in tiffinfo.c in der Funktion TIFFReadRawDataStriped(). Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
        }
      ],
      "product_status": {
        "known_affected": [
          "T024307",
          "T008027",
          "2951",
          "T001217",
          "T002207",
          "67646",
          "T000126",
          "398363",
          "T004914"
        ]
      },
      "release_date": "2022-08-31T22:00:00.000+00:00",
      "title": "CVE-2022-1354"
    },
    {
      "cve": "CVE-2022-1355",
      "notes": [
        {
          "category": "description",
          "text": "In libTIFF existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer fehlgeschlagenen sysmalloc-Assertion in rotateImage(), einer ung\u00fcltigen Zeigerfreigabeoperation in TIFFClose(), einem Stack-Puffer\u00fcberlauf in tiffcp.c in der Funktion main() und einem Heap-Puffer\u00fcberlauf in tiffinfo.c in der Funktion TIFFReadRawDataStriped(). Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
        }
      ],
      "product_status": {
        "known_affected": [
          "T024307",
          "T008027",
          "2951",
          "T001217",
          "T002207",
          "67646",
          "T000126",
          "398363",
          "T004914"
        ]
      },
      "release_date": "2022-08-31T22:00:00.000+00:00",
      "title": "CVE-2022-1355"
    },
    {
      "cve": "CVE-2022-2520",
      "notes": [
        {
          "category": "description",
          "text": "In libTIFF existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer fehlgeschlagenen sysmalloc-Assertion in rotateImage(), einer ung\u00fcltigen Zeigerfreigabeoperation in TIFFClose(), einem Stack-Puffer\u00fcberlauf in tiffcp.c in der Funktion main() und einem Heap-Puffer\u00fcberlauf in tiffinfo.c in der Funktion TIFFReadRawDataStriped(). Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
        }
      ],
      "product_status": {
        "known_affected": [
          "T024307",
          "T008027",
          "2951",
          "T001217",
          "T002207",
          "67646",
          "T000126",
          "398363",
          "T004914"
        ]
      },
      "release_date": "2022-08-31T22:00:00.000+00:00",
      "title": "CVE-2022-2520"
    },
    {
      "cve": "CVE-2022-2521",
      "notes": [
        {
          "category": "description",
          "text": "In libTIFF existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer fehlgeschlagenen sysmalloc-Assertion in rotateImage(), einer ung\u00fcltigen Zeigerfreigabeoperation in TIFFClose(), einem Stack-Puffer\u00fcberlauf in tiffcp.c in der Funktion main() und einem Heap-Puffer\u00fcberlauf in tiffinfo.c in der Funktion TIFFReadRawDataStriped(). Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
        }
      ],
      "product_status": {
        "known_affected": [
          "T024307",
          "T008027",
          "2951",
          "T001217",
          "T002207",
          "67646",
          "T000126",
          "398363",
          "T004914"
        ]
      },
      "release_date": "2022-08-31T22:00:00.000+00:00",
      "title": "CVE-2022-2521"
    }
  ]
}
  WID-SEC-W-2022-1250
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "libTIFF ist ein Softwarepaket f\u00fcr die Verarbeitung von Bilddateien in Tag Image File Format (TIFF).",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in libTIFF ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- UNIX\n- Linux\n- Windows\n- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2022-1250 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1250.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2022-1250 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1250"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS2-2023-2055 vom 2023-06-05",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2055.html"
      },
      {
        "category": "external",
        "summary": "National Vulnerability Database - CVE-2022-2520 vom 2022-08-31",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2520"
      },
      {
        "category": "external",
        "summary": "National Vulnerability Database - CVE-2022-2520 vom 2022-08-31",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2521"
      },
      {
        "category": "external",
        "summary": "National Vulnerability Database - CVE-2022-2520 vom 2022-08-31",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1355"
      },
      {
        "category": "external",
        "summary": "National Vulnerability Database - CVE-2022-2520 vom 2022-08-31",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1354"
      },
      {
        "category": "external",
        "summary": "PoC",
        "url": "https://gitlab.com/libtiff/libtiff/-/issues/424"
      },
      {
        "category": "external",
        "summary": "PoC",
        "url": "https://gitlab.com/libtiff/libtiff/-/issues/422"
      },
      {
        "category": "external",
        "summary": "PoC",
        "url": "https://gitlab.com/libtiff/libtiff/-/issues/400"
      },
      {
        "category": "external",
        "summary": "PoC",
        "url": "https://gitlab.com/libtiff/libtiff/-/issues/319"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5619-1 vom 2022-09-20",
        "url": "https://ubuntu.com/security/notices/USN-5619-1"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:3679-1 vom 2022-10-20",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012592.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2022:3690-1 vom 2022-10-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012599.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2022-183 vom 2022-11-04",
        "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-183.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-5714-1 vom 2022-11-08",
        "url": "https://ubuntu.com/security/notices/USN-5714-1"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:7585 vom 2022-11-08",
        "url": "https://access.redhat.com/errata/RHSA-2022:7585"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:8194 vom 2022-11-15",
        "url": "https://access.redhat.com/errata/RHSA-2022:8194"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2022-7585 vom 2022-11-15",
        "url": "https://linux.oracle.com/errata/ELSA-2022-7585.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2022-1891 vom 2022-12-07",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1891.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:8781 vom 2022-12-08",
        "url": "https://access.redhat.com/errata/RHSA-2022:8781"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2022-1644 vom 2022-12-10",
        "url": "https://alas.aws.amazon.com/ALAS-2022-1644.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-0095 vom 2023-01-12",
        "url": "https://linux.oracle.com/errata/ELSA-2023-0095.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-3278 vom 2023-01-20",
        "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-0302 vom 2023-01-24",
        "url": "https://linux.oracle.com/errata/ELSA-2023-0302.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:0302 vom 2023-01-23",
        "url": "https://access.redhat.com/errata/RHSA-2023:0302"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-5333 vom 2023-01-29",
        "url": "https://www.debian.org/security/2023/dsa-5333"
      }
    ],
    "source_lang": "en-US",
    "title": "libTIFF: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
    "tracking": {
      "current_release_date": "2023-06-05T22:00:00.000+00:00",
      "generator": {
        "date": "2024-08-15T17:34:21.452+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.5"
        }
      },
      "id": "WID-SEC-W-2022-1250",
      "initial_release_date": "2022-08-31T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2022-08-31T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2022-09-07T22:00:00.000+00:00",
          "number": "2",
          "summary": "Exploit aufgenommen"
        },
        {
          "date": "2022-09-19T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2022-10-20T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2022-10-23T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2022-11-06T23:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2022-11-07T23:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2022-11-08T23:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2022-11-15T23:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
        },
        {
          "date": "2022-12-06T23:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2022-12-07T23:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2022-12-11T23:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2023-01-12T23:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2023-01-22T23:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2023-01-23T23:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
        },
        {
          "date": "2023-01-29T23:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2023-06-05T22:00:00.000+00:00",
          "number": "17",
          "summary": "Neue Updates von Amazon aufgenommen"
        }
      ],
      "status": "final",
      "version": "17"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Debian Linux",
            "product": {
              "name": "Debian Linux",
              "product_id": "2951",
              "product_identification_helper": {
                "cpe": "cpe:/o:debian:debian_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Open Source libTIFF",
                "product": {
                  "name": "Open Source libTIFF",
                  "product_id": "T001217",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:libtiff:libtiff:-"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Open Source libTIFF 4.4.0rc1",
                "product": {
                  "name": "Open Source libTIFF 4.4.0rc1",
                  "product_id": "T024307",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:libtiff:libtiff:4.4.0rc1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "libTIFF"
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux",
            "product": {
              "name": "Red Hat Enterprise Linux",
              "product_id": "67646",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:enterprise_linux:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Red Hat OpenShift",
            "product": {
              "name": "Red Hat OpenShift",
              "product_id": "T008027",
              "product_identification_helper": {
                "cpe": "cpe:/a:redhat:openshift:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-1354",
      "notes": [
        {
          "category": "description",
          "text": "In libTIFF existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer fehlgeschlagenen sysmalloc-Assertion in rotateImage(), einer ung\u00fcltigen Zeigerfreigabeoperation in TIFFClose(), einem Stack-Puffer\u00fcberlauf in tiffcp.c in der Funktion main() und einem Heap-Puffer\u00fcberlauf in tiffinfo.c in der Funktion TIFFReadRawDataStriped(). Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
        }
      ],
      "product_status": {
        "known_affected": [
          "T024307",
          "T008027",
          "2951",
          "T001217",
          "T002207",
          "67646",
          "T000126",
          "398363",
          "T004914"
        ]
      },
      "release_date": "2022-08-31T22:00:00.000+00:00",
      "title": "CVE-2022-1354"
    },
    {
      "cve": "CVE-2022-1355",
      "notes": [
        {
          "category": "description",
          "text": "In libTIFF existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer fehlgeschlagenen sysmalloc-Assertion in rotateImage(), einer ung\u00fcltigen Zeigerfreigabeoperation in TIFFClose(), einem Stack-Puffer\u00fcberlauf in tiffcp.c in der Funktion main() und einem Heap-Puffer\u00fcberlauf in tiffinfo.c in der Funktion TIFFReadRawDataStriped(). Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
        }
      ],
      "product_status": {
        "known_affected": [
          "T024307",
          "T008027",
          "2951",
          "T001217",
          "T002207",
          "67646",
          "T000126",
          "398363",
          "T004914"
        ]
      },
      "release_date": "2022-08-31T22:00:00.000+00:00",
      "title": "CVE-2022-1355"
    },
    {
      "cve": "CVE-2022-2520",
      "notes": [
        {
          "category": "description",
          "text": "In libTIFF existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer fehlgeschlagenen sysmalloc-Assertion in rotateImage(), einer ung\u00fcltigen Zeigerfreigabeoperation in TIFFClose(), einem Stack-Puffer\u00fcberlauf in tiffcp.c in der Funktion main() und einem Heap-Puffer\u00fcberlauf in tiffinfo.c in der Funktion TIFFReadRawDataStriped(). Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
        }
      ],
      "product_status": {
        "known_affected": [
          "T024307",
          "T008027",
          "2951",
          "T001217",
          "T002207",
          "67646",
          "T000126",
          "398363",
          "T004914"
        ]
      },
      "release_date": "2022-08-31T22:00:00.000+00:00",
      "title": "CVE-2022-2520"
    },
    {
      "cve": "CVE-2022-2521",
      "notes": [
        {
          "category": "description",
          "text": "In libTIFF existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer fehlgeschlagenen sysmalloc-Assertion in rotateImage(), einer ung\u00fcltigen Zeigerfreigabeoperation in TIFFClose(), einem Stack-Puffer\u00fcberlauf in tiffcp.c in der Funktion main() und einem Heap-Puffer\u00fcberlauf in tiffinfo.c in der Funktion TIFFReadRawDataStriped(). Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
        }
      ],
      "product_status": {
        "known_affected": [
          "T024307",
          "T008027",
          "2951",
          "T001217",
          "T002207",
          "67646",
          "T000126",
          "398363",
          "T004914"
        ]
      },
      "release_date": "2022-08-31T22:00:00.000+00:00",
      "title": "CVE-2022-2521"
    }
  ]
}
  ghsa-8g2j-v7wm-mhv5
Vulnerability from github
A heap buffer overflow flaw was found in Libtiffs' tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service.
{
  "affected": [],
  "aliases": [
    "CVE-2022-1354"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-125",
      "CWE-787"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2022-08-31T16:15:00Z",
    "severity": "MODERATE"
  },
  "details": "A heap buffer overflow flaw was found in Libtiffs\u0027 tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service.",
  "id": "GHSA-8g2j-v7wm-mhv5",
  "modified": "2023-01-21T03:30:28Z",
  "published": "2022-09-01T00:00:23Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1354"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2022:8194"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/security/cve/CVE-2022-1354"
    },
    {
      "type": "WEB",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074404"
    },
    {
      "type": "WEB",
      "url": "https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798"
    },
    {
      "type": "WEB",
      "url": "https://gitlab.com/libtiff/libtiff/-/issues/319"
    },
    {
      "type": "WEB",
      "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html"
    },
    {
      "type": "WEB",
      "url": "https://security.gentoo.org/glsa/202210-10"
    },
    {
      "type": "WEB",
      "url": "https://security.netapp.com/advisory/ntap-20221014-0007"
    },
    {
      "type": "WEB",
      "url": "https://www.debian.org/security/2023/dsa-5333"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
      "type": "CVSS_V3"
    }
  ]
}
  CERTFR-2025-AVI-0481
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
| 
 | ||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "IBM Cloud Pak for Security versions 1.10.x ant\u00e9rieures \u00e0 1.11.3.0",
      "product": {
        "name": "Cloud Pak",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "QRadar Suite Software versions post\u00e9rieures \u00e0 1.10.12.0 et ant\u00e9rieures \u00e0  1.11.3.0 ",
      "product": {
        "name": "QRadar",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-32996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32996"
    },
    {
      "name": "CVE-2019-11038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11038"
    },
    {
      "name": "CVE-2021-38593",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38593"
    },
    {
      "name": "CVE-2025-1334",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1334"
    },
    {
      "name": "CVE-2020-15250",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15250"
    },
    {
      "name": "CVE-2023-37920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
    },
    {
      "name": "CVE-2024-0793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0793"
    },
    {
      "name": "CVE-2017-9047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-9047"
    },
    {
      "name": "CVE-2024-49766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49766"
    },
    {
      "name": "CVE-2024-56326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
    },
    {
      "name": "CVE-2024-56171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
    },
    {
      "name": "CVE-2024-38819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
    },
    {
      "name": "CVE-2025-27144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
    },
    {
      "name": "CVE-2022-49043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
    },
    {
      "name": "CVE-2024-11831",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11831"
    },
    {
      "name": "CVE-2025-30691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30691"
    },
    {
      "name": "CVE-2024-38809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
    },
    {
      "name": "CVE-2025-27152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27152"
    },
    {
      "name": "CVE-2024-47764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47764"
    },
    {
      "name": "CVE-2023-52355",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52355"
    },
    {
      "name": "CVE-2025-22868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
    },
    {
      "name": "CVE-2024-56337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
    },
    {
      "name": "CVE-2025-32997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32997"
    },
    {
      "name": "CVE-2024-9902",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9902"
    },
    {
      "name": "CVE-2025-21587",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
    },
    {
      "name": "CVE-2024-45337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
    },
    {
      "name": "CVE-2024-56332",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56332"
    },
    {
      "name": "CVE-2024-56201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
    },
    {
      "name": "CVE-2024-38827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38827"
    },
    {
      "name": "CVE-2023-43804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
    },
    {
      "name": "CVE-2025-25019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25019"
    },
    {
      "name": "CVE-2020-35538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35538"
    },
    {
      "name": "CVE-2025-30698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
    },
    {
      "name": "CVE-2025-26791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26791"
    },
    {
      "name": "CVE-2024-49767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49767"
    },
    {
      "name": "CVE-2024-38828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
    },
    {
      "name": "CVE-2018-5711",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-5711"
    },
    {
      "name": "CVE-2023-1916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
    },
    {
      "name": "CVE-2025-25022",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25022"
    },
    {
      "name": "CVE-2025-25020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25020"
    },
    {
      "name": "CVE-2025-22869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
    },
    {
      "name": "CVE-2024-43800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43800"
    },
    {
      "name": "CVE-2022-1354",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
    },
    {
      "name": "CVE-2025-25021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25021"
    },
    {
      "name": "CVE-2024-52304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52304"
    },
    {
      "name": "CVE-2023-24607",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24607"
    },
    {
      "name": "CVE-2025-22235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
    },
    {
      "name": "CVE-2025-27789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
    },
    {
      "name": "CVE-2024-57556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57556"
    },
    {
      "name": "CVE-2025-27363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
    },
    {
      "name": "CVE-2025-24928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
    },
    {
      "name": "CVE-2024-50379",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
    },
    {
      "name": "CVE-2023-24056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24056"
    },
    {
      "name": "CVE-2024-38816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
    },
    {
      "name": "CVE-2024-52317",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52317"
    },
    {
      "name": "CVE-2024-52316",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
    },
    {
      "name": "CVE-2022-3570",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
    }
  ],
  "initial_release_date": "2025-06-06T00:00:00",
  "last_revision_date": "2025-06-06T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0481",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-06-06T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
  "vendor_advisories": [
    {
      "published_at": "2025-06-03",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7235432",
      "url": "https://www.ibm.com/support/pages/node/7235432"
    },
    {
      "published_at": "2025-06-03",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7235402",
      "url": "https://www.ibm.com/support/pages/node/7235402"
    }
  ]
}
  fkie_cve-2022-1354
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2022-1354 | Issue Tracking, Third Party Advisory | |
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2074404 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
| secalert@redhat.com | https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798 | Patch | |
| secalert@redhat.com | https://gitlab.com/libtiff/libtiff/-/issues/319 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
| secalert@redhat.com | https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html | Mailing List, Third Party Advisory | |
| secalert@redhat.com | https://security.gentoo.org/glsa/202210-10 | Third Party Advisory | |
| secalert@redhat.com | https://security.netapp.com/advisory/ntap-20221014-0007/ | Third Party Advisory | |
| secalert@redhat.com | https://www.debian.org/security/2023/dsa-5333 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/CVE-2022-1354 | Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=2074404 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://gitlab.com/libtiff/libtiff/-/issues/319 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202210-10 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20221014-0007/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2023/dsa-5333 | Third Party Advisory | 
| Vendor | Product | Version | |
|---|---|---|---|
| libtiff | libtiff | * | |
| fedoraproject | fedora | 34 | |
| fedoraproject | fedora | 35 | |
| fedoraproject | fedora | 36 | |
| redhat | enterprise_linux | 9.0 | |
| netapp | ontap_select_deploy_administration_utility | - | |
| debian | debian_linux | 10.0 | |
| debian | debian_linux | 11.0 | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "089A82D2-D7BA-42E9-961F-A61E72537850",
              "versionEndExcluding": "4.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
              "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
              "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A heap buffer overflow flaw was found in Libtiffs\u0027 tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service."
    },
    {
      "lang": "es",
      "value": "Se ha encontrado un fallo de desbordamiento del b\u00fafer de la pila en el archivo tiffinfo.c de Libtiffs, en la funci\u00f3n TIFFReadRawDataStriped(). Este defecto permite a un atacante pasar un archivo TIFF dise\u00f1ado a la herramienta tiffinfo, desencadenando un problema de desbordamiento del b\u00fafer de la pila y causando un fallo que conlleva a una denegaci\u00f3n de servicio"
    }
  ],
  "id": "CVE-2022-1354",
  "lastModified": "2024-11-21T06:40:33.447",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-31T16:15:09.520",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2022-1354"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074404"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/libtiff/libtiff/-/issues/319"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202210-10"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20221014-0007/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2023/dsa-5333"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2022-1354"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074404"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/libtiff/libtiff/-/issues/319"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202210-10"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20221014-0007/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2023/dsa-5333"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Secondary"
    }
  ]
}
  gsd-2022-1354
Vulnerability from gsd
{
  "GSD": {
    "alias": "CVE-2022-1354",
    "description": "A heap buffer overflow flaw was found in Libtiffs\u0027 tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service.",
    "id": "GSD-2022-1354",
    "references": [
      "https://www.suse.com/security/cve/CVE-2022-1354.html",
      "https://security.archlinux.org/CVE-2022-1354",
      "https://advisories.mageia.org/CVE-2022-1354.html",
      "https://access.redhat.com/errata/RHSA-2022:8194",
      "https://ubuntu.com/security/CVE-2022-1354",
      "https://www.debian.org/security/2023/dsa-5333"
    ]
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2022-1354"
      ],
      "details": "A heap buffer overflow flaw was found in Libtiffs\u0027 tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service.",
      "id": "GSD-2022-1354",
      "modified": "2023-12-13T01:19:27.925931Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "secalert@redhat.com",
        "ID": "CVE-2022-1354",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "libtiff",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "=",
                          "version_value": "Not-Known"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "A heap buffer overflow flaw was found in Libtiffs\u0027 tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "cweId": "CWE-125",
                "lang": "eng",
                "value": "CWE-125 - Out-of-bounds Read."
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2074404",
            "refsource": "MISC",
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074404"
          },
          {
            "name": "https://gitlab.com/libtiff/libtiff/-/issues/319",
            "refsource": "MISC",
            "url": "https://gitlab.com/libtiff/libtiff/-/issues/319"
          },
          {
            "name": "https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798",
            "refsource": "MISC",
            "url": "https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798"
          },
          {
            "name": "https://access.redhat.com/security/cve/CVE-2022-1354",
            "refsource": "MISC",
            "url": "https://access.redhat.com/security/cve/CVE-2022-1354"
          },
          {
            "name": "https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html",
            "refsource": "MISC",
            "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html"
          },
          {
            "name": "https://security.gentoo.org/glsa/202210-10",
            "refsource": "MISC",
            "url": "https://security.gentoo.org/glsa/202210-10"
          },
          {
            "name": "https://security.netapp.com/advisory/ntap-20221014-0007/",
            "refsource": "MISC",
            "url": "https://security.netapp.com/advisory/ntap-20221014-0007/"
          },
          {
            "name": "https://www.debian.org/security/2023/dsa-5333",
            "refsource": "MISC",
            "url": "https://www.debian.org/security/2023/dsa-5333"
          }
        ]
      }
    },
    "gitlab.com": {
      "advisories": [
        {
          "affected_range": "\u003c4.4.0",
          "affected_versions": "All versions before 4.4.0",
          "cvss_v3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "cwe_ids": [
            "CWE-1035",
            "CWE-125",
            "CWE-937"
          ],
          "date": "2023-02-23",
          "description": "A heap buffer overflow flaw was found in Libtiffs\u0027 tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service.",
          "fixed_versions": [
            "4.4.0"
          ],
          "identifier": "CVE-2022-1354",
          "identifiers": [
            "CVE-2022-1354"
          ],
          "not_impacted": "All versions starting from 4.4.0",
          "package_slug": "conan/libtiff",
          "pubdate": "2022-08-31",
          "solution": "Upgrade to version 4.4.0 or above.",
          "title": "Out-of-bounds Write",
          "urls": [
            "https://nvd.nist.gov/vuln/detail/CVE-2022-1354",
            "https://bugzilla.redhat.com/show_bug.cgi?id=2074404",
            "https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798",
            "https://access.redhat.com/security/cve/CVE-2022-1354",
            "https://gitlab.com/libtiff/libtiff/-/issues/319"
          ],
          "uuid": "42e17997-c8cd-4672-963c-4474fc1e6a00"
        }
      ]
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "4.4.0",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2022-1354"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "A heap buffer overflow flaw was found in Libtiffs\u0027 tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "CWE-125"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2074404",
              "refsource": "MISC",
              "tags": [
                "Exploit",
                "Issue Tracking",
                "Patch",
                "Third Party Advisory"
              ],
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074404"
            },
            {
              "name": "https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798",
              "refsource": "MISC",
              "tags": [
                "Patch"
              ],
              "url": "https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798"
            },
            {
              "name": "https://access.redhat.com/security/cve/CVE-2022-1354",
              "refsource": "MISC",
              "tags": [
                "Issue Tracking",
                "Third Party Advisory"
              ],
              "url": "https://access.redhat.com/security/cve/CVE-2022-1354"
            },
            {
              "name": "https://gitlab.com/libtiff/libtiff/-/issues/319",
              "refsource": "MISC",
              "tags": [
                "Exploit",
                "Issue Tracking",
                "Patch",
                "Third Party Advisory"
              ],
              "url": "https://gitlab.com/libtiff/libtiff/-/issues/319"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20221014-0007/",
              "refsource": "CONFIRM",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://security.netapp.com/advisory/ntap-20221014-0007/"
            },
            {
              "name": "GLSA-202210-10",
              "refsource": "GENTOO",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://security.gentoo.org/glsa/202210-10"
            },
            {
              "name": "[debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update",
              "refsource": "MLIST",
              "tags": [
                "Mailing List",
                "Third Party Advisory"
              ],
              "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html"
            },
            {
              "name": "DSA-5333",
              "refsource": "DEBIAN",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://www.debian.org/security/2023/dsa-5333"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV3": {
          "cvssV3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "exploitabilityScore": 1.8,
          "impactScore": 3.6
        }
      },
      "lastModifiedDate": "2023-02-23T15:50Z",
      "publishedDate": "2022-08-31T16:15Z"
    }
  }
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.