Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-2953
Vulnerability from cvelistv5
Published
2022-08-29 00:00
Modified
2024-08-03 00:53
Severity ?
EPSS score ?
Summary
LibTIFF 4.4.0 has an out-of-bounds read in extractImageSection in tools/tiffcrop.c:6905, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 48d6ece8.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:53:00.658Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gitlab.com/libtiff/libtiff/-/issues/414" }, { "tags": [ "x_transferred" ], "url": "https://gitlab.com/libtiff/libtiff/-/commit/48d6ece8389b01129e7d357f0985c8f938ce3da3" }, { "tags": [ "x_transferred" ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2953.json" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20221014-0008/" }, { "name": "DSA-5333", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5333" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "libtiff", "vendor": "libtiff", "versions": [ { "status": "affected", "version": "\u003c=4.4.0" } ] } ], "credits": [ { "lang": "en", "value": "wangdw.augustus@gmail.com" } ], "descriptions": [ { "lang": "en", "value": "LibTIFF 4.4.0 has an out-of-bounds read in extractImageSection in tools/tiffcrop.c:6905, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 48d6ece8." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read in libtiff", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-30T00:00:00", "orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "shortName": "GitLab" }, "references": [ { "url": "https://gitlab.com/libtiff/libtiff/-/issues/414" }, { "url": "https://gitlab.com/libtiff/libtiff/-/commit/48d6ece8389b01129e7d357f0985c8f938ce3da3" }, { "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2953.json" }, { "url": "https://security.netapp.com/advisory/ntap-20221014-0008/" }, { "name": "DSA-5333", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5333" } ] } }, "cveMetadata": { "assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", "assignerShortName": "GitLab", "cveId": "CVE-2022-2953", "datePublished": "2022-08-29T00:00:00", "dateReserved": "2022-08-22T00:00:00", "dateUpdated": "2024-08-03T00:53:00.658Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-2953\",\"sourceIdentifier\":\"cve@gitlab.com\",\"published\":\"2022-08-29T15:15:10.730\",\"lastModified\":\"2024-11-21T07:01:58.930\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"LibTIFF 4.4.0 has an out-of-bounds read in extractImageSection in tools/tiffcrop.c:6905, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 48d6ece8.\"},{\"lang\":\"es\",\"value\":\"LibTIFF versi\u00f3n 4.4.0, presenta una lectura fuera de l\u00edmites en extractImageSection en el archivo tools/tiffcrop.c:6905, lo que permite a atacantes causar una denegaci\u00f3n de servicio por medio de un archivo tiff dise\u00f1ado. Para usuarios que compilan libtiff desde las fuentes, la correcci\u00f3n est\u00e1 disponible con el commit 48d6ece8\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve@gitlab.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.4.0\",\"matchCriteriaId\":\"6E0B7DC1-7265-4D0F-9400-1559C3378D18\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7CF3019-975D-40BB-A8A4-894E62BD3797\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]}],\"references\":[{\"url\":\"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2953.json\",\"source\":\"cve@gitlab.com\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"VDB Entry\"]},{\"url\":\"https://gitlab.com/libtiff/libtiff/-/commit/48d6ece8389b01129e7d357f0985c8f938ce3da3\",\"source\":\"cve@gitlab.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://gitlab.com/libtiff/libtiff/-/issues/414\",\"source\":\"cve@gitlab.com\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20221014-0008/\",\"source\":\"cve@gitlab.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5333\",\"source\":\"cve@gitlab.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2953.json\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"VDB Entry\"]},{\"url\":\"https://gitlab.com/libtiff/libtiff/-/commit/48d6ece8389b01129e7d357f0985c8f938ce3da3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://gitlab.com/libtiff/libtiff/-/issues/414\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20221014-0008/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5333\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
gsd-2022-2953
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
LibTIFF 4.4.0 has an out-of-bounds read in extractImageSection in tools/tiffcrop.c:6905, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 48d6ece8.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2022-2953", "description": "LibTIFF 4.4.0 has an out-of-bounds read in extractImageSection in tools/tiffcrop.c:6905, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 48d6ece8.", "id": "GSD-2022-2953", "references": [ "https://www.suse.com/security/cve/CVE-2022-2953.html", "https://access.redhat.com/errata/RHSA-2023:0095", "https://ubuntu.com/security/CVE-2022-2953", "https://www.debian.org/security/2023/dsa-5333", "https://access.redhat.com/errata/RHSA-2023:0302" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-2953" ], "details": "LibTIFF 4.4.0 has an out-of-bounds read in extractImageSection in tools/tiffcrop.c:6905, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 48d6ece8.", "id": "GSD-2022-2953", "modified": "2023-12-13T01:19:20.031133Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@gitlab.com", "ID": "CVE-2022-2953", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "libtiff", "version": { "version_data": [ { "version_value": "\u003c=4.4.0" } ] } } ] }, "vendor_name": "libtiff" } ] } }, "credit": [ { "lang": "eng", "value": "wangdw.augustus@gmail.com" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "LibTIFF 4.4.0 has an out-of-bounds read in extractImageSection in tools/tiffcrop.c:6905, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 48d6ece8." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read in libtiff" } ] } ] }, "references": { "reference_data": [ { "name": "https://gitlab.com/libtiff/libtiff/-/issues/414", "refsource": "MISC", "url": "https://gitlab.com/libtiff/libtiff/-/issues/414" }, { "name": "https://gitlab.com/libtiff/libtiff/-/commit/48d6ece8389b01129e7d357f0985c8f938ce3da3", "refsource": "MISC", "url": "https://gitlab.com/libtiff/libtiff/-/commit/48d6ece8389b01129e7d357f0985c8f938ce3da3" }, { "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2953.json", "refsource": "CONFIRM", "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2953.json" }, { "name": "https://security.netapp.com/advisory/ntap-20221014-0008/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20221014-0008/" }, { "name": "DSA-5333", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2023/dsa-5333" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003c=4.4.0", "affected_versions": "All versions up to 4.4.0", "cvss_v3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-125", "CWE-937" ], "date": "2023-02-23", "description": "LibTIFF 4.4.0 has an out-of-bounds read in extractImageSection in tools/tiffcrop.c:6905, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 48d6ece8.", "fixed_versions": [], "identifier": "CVE-2022-2953", "identifiers": [ "CVE-2022-2953" ], "not_impacted": "", "package_slug": "conan/libtiff", "pubdate": "2022-08-29", "solution": "Unfortunately, there is no solution available yet.", "title": "Out-of-bounds Read", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2022-2953", "https://gitlab.com/libtiff/libtiff/-/commit/48d6ece8389b01129e7d357f0985c8f938ce3da3", "https://gitlab.com/libtiff/libtiff/-/issues/414", "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2953.json" ], "uuid": "a87f1f70-6ef9-4be8-941d-4170502532fe" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "4.4.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@gitlab.com", "ID": "CVE-2022-2953" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "LibTIFF 4.4.0 has an out-of-bounds read in extractImageSection in tools/tiffcrop.c:6905, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 48d6ece8." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-125" } ] } ] }, "references": { "reference_data": [ { "name": "https://gitlab.com/libtiff/libtiff/-/commit/48d6ece8389b01129e7d357f0985c8f938ce3da3", "refsource": "MISC", "tags": [ "Patch" ], "url": "https://gitlab.com/libtiff/libtiff/-/commit/48d6ece8389b01129e7d357f0985c8f938ce3da3" }, { "name": "https://gitlab.com/libtiff/libtiff/-/issues/414", "refsource": "MISC", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://gitlab.com/libtiff/libtiff/-/issues/414" }, { "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2953.json", "refsource": "CONFIRM", "tags": [ "Exploit", "Issue Tracking", "Patch", "VDB Entry" ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2953.json" }, { "name": "https://security.netapp.com/advisory/ntap-20221014-0008/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20221014-0008/" }, { "name": "DSA-5333", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2023/dsa-5333" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6 } }, "lastModifiedDate": "2023-02-23T16:01Z", "publishedDate": "2022-08-29T15:15Z" } } }
ghsa-xcmj-v3mr-j4qc
Vulnerability from github
Published
2022-08-29 20:06
Modified
2022-09-03 00:00
Severity ?
Details
LibTIFF 4.4.0 has an out-of-bounds read in extractImageSection in tools/tiffcrop.c:6905, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 48d6ece8.
{ "affected": [], "aliases": [ "CVE-2022-2953" ], "database_specific": { "cwe_ids": [ "CWE-125" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-08-29T15:15:00Z", "severity": "MODERATE" }, "details": "LibTIFF 4.4.0 has an out-of-bounds read in extractImageSection in tools/tiffcrop.c:6905, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 48d6ece8.", "id": "GHSA-xcmj-v3mr-j4qc", "modified": "2022-09-03T00:00:17Z", "published": "2022-08-29T20:06:50Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2953" }, { "type": "WEB", "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2953.json" }, { "type": "WEB", "url": "https://gitlab.com/libtiff/libtiff/-/commit/48d6ece8389b01129e7d357f0985c8f938ce3da3" }, { "type": "WEB", "url": "https://gitlab.com/libtiff/libtiff/-/issues/414" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20221014-0008" }, { "type": "WEB", "url": "https://www.debian.org/security/2023/dsa-5333" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
rhsa-2023_0095
Vulnerability from csaf_redhat
Published
2023-01-12 09:27
Modified
2024-11-22 20:56
Summary
Red Hat Security Advisory: libtiff security update
Notes
Topic
An update for libtiff is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* LibTiff: DoS from Divide By Zero Error (CVE-2022-2056, CVE-2022-2057, CVE-2022-2058)
* libtiff: Double free or corruption in rotateImage() function at tiffcrop.c (CVE-2022-2519)
* libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c (CVE-2022-2867)
* libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSamples8bits() (CVE-2022-2869)
* libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c (CVE-2022-2953)
* libtiff: Assertion fail in rotateImage() function at tiffcrop.c (CVE-2022-2520)
* libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c (CVE-2022-2521)
* libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits() (CVE-2022-2868)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for libtiff is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.\n\nSecurity Fix(es):\n\n* LibTiff: DoS from Divide By Zero Error (CVE-2022-2056, CVE-2022-2057, CVE-2022-2058)\n\n* libtiff: Double free or corruption in rotateImage() function at tiffcrop.c (CVE-2022-2519)\n\n* libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c (CVE-2022-2867)\n\n* libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSamples8bits() (CVE-2022-2869)\n\n* libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c (CVE-2022-2953)\n\n* libtiff: Assertion fail in rotateImage() function at tiffcrop.c (CVE-2022-2520)\n\n* libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c (CVE-2022-2521)\n\n* libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits() (CVE-2022-2868)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:0095", "url": "https://access.redhat.com/errata/RHSA-2023:0095" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2103222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103222" }, { "category": "external", "summary": "2118847", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2118847" }, { "category": "external", "summary": "2118863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2118863" }, { "category": "external", "summary": "2118869", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2118869" }, { "category": "external", "summary": "2122789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122789" }, { "category": "external", "summary": "2122792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122792" }, { "category": "external", "summary": "2122799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122799" }, { "category": "external", "summary": "2134432", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134432" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0095.json" } ], "title": "Red Hat Security Advisory: libtiff security update", "tracking": { "current_release_date": "2024-11-22T20:56:13+00:00", "generator": { "date": "2024-11-22T20:56:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2023:0095", "initial_release_date": "2023-01-12T09:27:26+00:00", "revision_history": [ { "date": "2023-01-12T09:27:26+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-01-12T09:27:26+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T20:56:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } }, { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 8)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "libtiff-0:4.0.9-26.el8_7.src", "product": { "name": "libtiff-0:4.0.9-26.el8_7.src", "product_id": "libtiff-0:4.0.9-26.el8_7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff@4.0.9-26.el8_7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "libtiff-0:4.0.9-26.el8_7.aarch64", "product": { "name": "libtiff-0:4.0.9-26.el8_7.aarch64", "product_id": "libtiff-0:4.0.9-26.el8_7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff@4.0.9-26.el8_7?arch=aarch64" } } }, { "category": "product_version", "name": "libtiff-devel-0:4.0.9-26.el8_7.aarch64", "product": { "name": "libtiff-devel-0:4.0.9-26.el8_7.aarch64", "product_id": "libtiff-devel-0:4.0.9-26.el8_7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-26.el8_7?arch=aarch64" } } }, { "category": "product_version", "name": "libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "product": { "name": "libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "product_id": "libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-26.el8_7?arch=aarch64" } } }, { "category": "product_version", "name": "libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "product": { "name": "libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "product_id": "libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-26.el8_7?arch=aarch64" } } }, { "category": "product_version", "name": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "product": { "name": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "product_id": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-26.el8_7?arch=aarch64" } } }, { "category": "product_version", "name": "libtiff-tools-0:4.0.9-26.el8_7.aarch64", "product": { "name": "libtiff-tools-0:4.0.9-26.el8_7.aarch64", "product_id": "libtiff-tools-0:4.0.9-26.el8_7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-26.el8_7?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libtiff-0:4.0.9-26.el8_7.ppc64le", "product": { "name": "libtiff-0:4.0.9-26.el8_7.ppc64le", "product_id": "libtiff-0:4.0.9-26.el8_7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff@4.0.9-26.el8_7?arch=ppc64le" } } }, { "category": "product_version", "name": "libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "product": { "name": "libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "product_id": "libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-26.el8_7?arch=ppc64le" } } }, { "category": "product_version", "name": "libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "product": { "name": "libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "product_id": "libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-26.el8_7?arch=ppc64le" } } }, { "category": "product_version", "name": "libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "product": { "name": "libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "product_id": "libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-26.el8_7?arch=ppc64le" } } }, { "category": "product_version", "name": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "product": { "name": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "product_id": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-26.el8_7?arch=ppc64le" } } }, { "category": "product_version", "name": "libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "product": { "name": "libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "product_id": "libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-26.el8_7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libtiff-0:4.0.9-26.el8_7.i686", "product": { "name": "libtiff-0:4.0.9-26.el8_7.i686", "product_id": "libtiff-0:4.0.9-26.el8_7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff@4.0.9-26.el8_7?arch=i686" } } }, { "category": "product_version", "name": "libtiff-devel-0:4.0.9-26.el8_7.i686", "product": { "name": "libtiff-devel-0:4.0.9-26.el8_7.i686", "product_id": "libtiff-devel-0:4.0.9-26.el8_7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-26.el8_7?arch=i686" } } }, { "category": "product_version", "name": "libtiff-debugsource-0:4.0.9-26.el8_7.i686", "product": { "name": "libtiff-debugsource-0:4.0.9-26.el8_7.i686", "product_id": "libtiff-debugsource-0:4.0.9-26.el8_7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-26.el8_7?arch=i686" } } }, { "category": "product_version", "name": "libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "product": { "name": "libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "product_id": "libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-26.el8_7?arch=i686" } } }, { "category": "product_version", "name": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "product": { "name": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "product_id": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-26.el8_7?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "libtiff-0:4.0.9-26.el8_7.x86_64", "product": { "name": "libtiff-0:4.0.9-26.el8_7.x86_64", "product_id": "libtiff-0:4.0.9-26.el8_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff@4.0.9-26.el8_7?arch=x86_64" } } }, { "category": "product_version", "name": "libtiff-devel-0:4.0.9-26.el8_7.x86_64", "product": { "name": "libtiff-devel-0:4.0.9-26.el8_7.x86_64", "product_id": "libtiff-devel-0:4.0.9-26.el8_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-26.el8_7?arch=x86_64" } } }, { "category": "product_version", "name": "libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "product": { "name": "libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "product_id": "libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-26.el8_7?arch=x86_64" } } }, { "category": "product_version", "name": "libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "product": { "name": "libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "product_id": "libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-26.el8_7?arch=x86_64" } } }, { "category": "product_version", "name": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "product": { "name": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "product_id": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-26.el8_7?arch=x86_64" } } }, { "category": "product_version", "name": "libtiff-tools-0:4.0.9-26.el8_7.x86_64", "product": { "name": "libtiff-tools-0:4.0.9-26.el8_7.x86_64", "product_id": "libtiff-tools-0:4.0.9-26.el8_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-26.el8_7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libtiff-0:4.0.9-26.el8_7.s390x", "product": { "name": "libtiff-0:4.0.9-26.el8_7.s390x", "product_id": "libtiff-0:4.0.9-26.el8_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff@4.0.9-26.el8_7?arch=s390x" } } }, { "category": "product_version", "name": "libtiff-devel-0:4.0.9-26.el8_7.s390x", "product": { "name": "libtiff-devel-0:4.0.9-26.el8_7.s390x", "product_id": "libtiff-devel-0:4.0.9-26.el8_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-26.el8_7?arch=s390x" } } }, { "category": "product_version", "name": "libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "product": { "name": "libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "product_id": "libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-26.el8_7?arch=s390x" } } }, { "category": "product_version", "name": "libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "product": { "name": "libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "product_id": "libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-26.el8_7?arch=s390x" } } }, { "category": "product_version", "name": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "product": { "name": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "product_id": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-26.el8_7?arch=s390x" } } }, { "category": "product_version", "name": "libtiff-tools-0:4.0.9-26.el8_7.s390x", "product": { "name": "libtiff-tools-0:4.0.9-26.el8_7.s390x", "product_id": "libtiff-tools-0:4.0.9-26.el8_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-26.el8_7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:4.0.9-26.el8_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64" }, "product_reference": "libtiff-0:4.0.9-26.el8_7.aarch64", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:4.0.9-26.el8_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686" }, "product_reference": "libtiff-0:4.0.9-26.el8_7.i686", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:4.0.9-26.el8_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le" }, "product_reference": "libtiff-0:4.0.9-26.el8_7.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:4.0.9-26.el8_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x" }, "product_reference": "libtiff-0:4.0.9-26.el8_7.s390x", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:4.0.9-26.el8_7.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src" }, "product_reference": "libtiff-0:4.0.9-26.el8_7.src", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:4.0.9-26.el8_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64" }, "product_reference": "libtiff-0:4.0.9-26.el8_7.x86_64", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64" }, "product_reference": "libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:4.0.9-26.el8_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686" }, "product_reference": "libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le" }, "product_reference": "libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:4.0.9-26.el8_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x" }, "product_reference": "libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64" }, "product_reference": "libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debugsource-0:4.0.9-26.el8_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64" }, "product_reference": "libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debugsource-0:4.0.9-26.el8_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686" }, "product_reference": "libtiff-debugsource-0:4.0.9-26.el8_7.i686", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le" }, "product_reference": "libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debugsource-0:4.0.9-26.el8_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x" }, "product_reference": "libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debugsource-0:4.0.9-26.el8_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64" }, "product_reference": "libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:4.0.9-26.el8_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64" }, "product_reference": "libtiff-devel-0:4.0.9-26.el8_7.aarch64", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:4.0.9-26.el8_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686" }, "product_reference": "libtiff-devel-0:4.0.9-26.el8_7.i686", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:4.0.9-26.el8_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le" }, "product_reference": "libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:4.0.9-26.el8_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x" }, "product_reference": "libtiff-devel-0:4.0.9-26.el8_7.s390x", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:4.0.9-26.el8_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64" }, "product_reference": "libtiff-devel-0:4.0.9-26.el8_7.x86_64", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-0:4.0.9-26.el8_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64" }, "product_reference": "libtiff-tools-0:4.0.9-26.el8_7.aarch64", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-0:4.0.9-26.el8_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le" }, "product_reference": "libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-0:4.0.9-26.el8_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x" }, "product_reference": "libtiff-tools-0:4.0.9-26.el8_7.s390x", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-0:4.0.9-26.el8_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64" }, "product_reference": "libtiff-tools-0:4.0.9-26.el8_7.x86_64", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64" }, "product_reference": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686" }, "product_reference": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le" }, "product_reference": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x" }, "product_reference": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" }, "product_reference": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "relates_to_product_reference": "AppStream-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:4.0.9-26.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64" }, "product_reference": "libtiff-0:4.0.9-26.el8_7.aarch64", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:4.0.9-26.el8_7.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686" }, "product_reference": "libtiff-0:4.0.9-26.el8_7.i686", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:4.0.9-26.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le" }, "product_reference": "libtiff-0:4.0.9-26.el8_7.ppc64le", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:4.0.9-26.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x" }, "product_reference": "libtiff-0:4.0.9-26.el8_7.s390x", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:4.0.9-26.el8_7.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src" }, "product_reference": "libtiff-0:4.0.9-26.el8_7.src", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:4.0.9-26.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64" }, "product_reference": "libtiff-0:4.0.9-26.el8_7.x86_64", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64" }, "product_reference": "libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:4.0.9-26.el8_7.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686" }, "product_reference": "libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le" }, "product_reference": "libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:4.0.9-26.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x" }, "product_reference": "libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64" }, "product_reference": "libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debugsource-0:4.0.9-26.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64" }, "product_reference": "libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debugsource-0:4.0.9-26.el8_7.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686" }, "product_reference": "libtiff-debugsource-0:4.0.9-26.el8_7.i686", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le" }, "product_reference": "libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debugsource-0:4.0.9-26.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x" }, "product_reference": "libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debugsource-0:4.0.9-26.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64" }, "product_reference": "libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:4.0.9-26.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64" }, "product_reference": "libtiff-devel-0:4.0.9-26.el8_7.aarch64", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:4.0.9-26.el8_7.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686" }, "product_reference": "libtiff-devel-0:4.0.9-26.el8_7.i686", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:4.0.9-26.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le" }, "product_reference": "libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:4.0.9-26.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x" }, "product_reference": "libtiff-devel-0:4.0.9-26.el8_7.s390x", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:4.0.9-26.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64" }, "product_reference": "libtiff-devel-0:4.0.9-26.el8_7.x86_64", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-0:4.0.9-26.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64" }, "product_reference": "libtiff-tools-0:4.0.9-26.el8_7.aarch64", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-0:4.0.9-26.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le" }, "product_reference": "libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-0:4.0.9-26.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x" }, "product_reference": "libtiff-tools-0:4.0.9-26.el8_7.s390x", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-0:4.0.9-26.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64" }, "product_reference": "libtiff-tools-0:4.0.9-26.el8_7.x86_64", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64" }, "product_reference": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686" }, "product_reference": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le" }, "product_reference": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x" }, "product_reference": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" }, "product_reference": "libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "relates_to_product_reference": "CRB-8.7.0.Z.MAIN" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2056", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "discovery_date": "2022-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2103222" } ], "notes": [ { "category": "description", "text": "A divide-by-zero vulnerability was found in libtiff. This flaw allows an attacker to cause a denial of service via a crafted tiff file.", "title": "Vulnerability description" }, { "category": "summary", "text": "libtiff: division by zero issues in tiffcrop", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2056" }, { "category": "external", "summary": "RHBZ#2103222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103222" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2056", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2056" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2056", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2056" } ], "release_date": "2022-06-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-01-12T09:27:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0095" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libtiff: division by zero issues in tiffcrop" }, { "cve": "CVE-2022-2057", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "discovery_date": "2022-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2103222" } ], "notes": [ { "category": "description", "text": "A divide-by-zero vulnerability was found in libtiff. This flaw allows an attacker to cause a denial of service via a crafted tiff file.", "title": "Vulnerability description" }, { "category": "summary", "text": "libtiff: division by zero issues in tiffcrop", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2057" }, { "category": "external", "summary": "RHBZ#2103222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103222" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2057", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2057" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2057", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2057" } ], "release_date": "2022-06-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-01-12T09:27:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0095" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libtiff: division by zero issues in tiffcrop" }, { "cve": "CVE-2022-2058", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "discovery_date": "2022-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2103222" } ], "notes": [ { "category": "description", "text": "A divide-by-zero vulnerability was found in libtiff. This flaw allows an attacker to cause a denial of service via a crafted tiff file.", "title": "Vulnerability description" }, { "category": "summary", "text": "libtiff: division by zero issues in tiffcrop", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2058" }, { "category": "external", "summary": "RHBZ#2103222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103222" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2058", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2058" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2058", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2058" } ], "release_date": "2022-06-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-01-12T09:27:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0095" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libtiff: division by zero issues in tiffcrop" }, { "cve": "CVE-2022-2519", "cwe": { "id": "CWE-415", "name": "Double Free" }, "discovery_date": "2022-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2122789" } ], "notes": [ { "category": "description", "text": "A double-free flaw was found in the tiffcrop tool distributed with the libtiff tools package. The double-free issue leads to a denial of service, impacting the availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libtiff: Double free or corruption in rotateImage() function at tiffcrop.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2519" }, { "category": "external", "summary": "RHBZ#2122789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122789" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2519", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2519" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2519", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2519" } ], "release_date": "2022-05-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-01-12T09:27:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0095" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libtiff: Double free or corruption in rotateImage() function at tiffcrop.c" }, { "cve": "CVE-2022-2520", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "discovery_date": "2022-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2122792" } ], "notes": [ { "category": "description", "text": "A flaw was found in libtiff 4.4.0rc1. There is a sysmalloc assertion fail in rotateImage() at tiffcrop.c:8621 that can cause program crash when reading a crafted input.", "title": "Vulnerability description" }, { "category": "summary", "text": "libtiff: Assertion fail in rotateImage() function at tiffcrop.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2520" }, { "category": "external", "summary": "RHBZ#2122792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122792" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2520", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2520" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2520", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2520" } ], "release_date": "2022-05-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-01-12T09:27:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0095" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libtiff: Assertion fail in rotateImage() function at tiffcrop.c" }, { "cve": "CVE-2022-2521", "cwe": { "id": "CWE-763", "name": "Release of Invalid Pointer or Reference" }, "discovery_date": "2022-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2122799" } ], "notes": [ { "category": "description", "text": "It was found in libtiff 4.4.0rc1 that there is an invalid pointer free operation in TIFFClose() at tif_close.c:131 called by tiffcrop.c:2522 that can cause a program crash and denial of service while processing crafted input.", "title": "Vulnerability description" }, { "category": "summary", "text": "libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2521" }, { "category": "external", "summary": "RHBZ#2122799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122799" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2521", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2521" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2521", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2521" } ], "release_date": "2022-05-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-01-12T09:27:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0095" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c" }, { "cve": "CVE-2022-2867", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-02-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2118847" } ], "notes": [ { "category": "description", "text": "A flaw was found in libtiff\u0027s tiffcrop utility that has a uint32_t underflow that can lead to an out-of-bounds read and write. This flaw allows an attacker who supplies a crafted file to tiffcrop (likely via tricking a user to run tiffcrop on it with certain parameters)to cause a crash or, in some cases, further exploitation.", "title": "Vulnerability description" }, { "category": "summary", "text": "libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as a Moderate because it is present in the tiffcrop utility rather than the libtiff library itself.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2867" }, { "category": "external", "summary": "RHBZ#2118847", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2118847" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2867", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2867" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2867", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2867" } ], "release_date": "2021-12-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-01-12T09:27:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0095" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c" }, { "cve": "CVE-2022-2868", "cwe": { "id": "CWE-1284", "name": "Improper Validation of Specified Quantity in Input" }, "discovery_date": "2022-02-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2118863" } ], "notes": [ { "category": "description", "text": "An improper input validation flaw was found in libtiff\u0027s tiffcrop utility. This issue can lead to an out-of-bounds read and cause a crash if an attacker can supply a crafted file to tiffcrop.", "title": "Vulnerability description" }, { "category": "summary", "text": "libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits()", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is present in the tiffcrop tool only and not in the libtiff library code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2868" }, { "category": "external", "summary": "RHBZ#2118863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2118863" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2868", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2868" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2868", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2868" } ], "release_date": "2021-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-01-12T09:27:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0095" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits()" }, { "cve": "CVE-2022-2869", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-02-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2118869" } ], "notes": [ { "category": "description", "text": "A flaw was found in libtiff\u0027s tiffcrop tool that has a uint32_t underflow, which leads to an out-of-bounds read and write in the extractContigSamples8bits routine. This flaw allows an attacker who supplies a crafted file to tiffcrop to trick a user into opening the crafted file with tiffcrop, causing a crash or potential further exploitations.", "title": "Vulnerability description" }, { "category": "summary", "text": "libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSamples8bits()", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is present only in the tiffcrop tool, not in the libtiff library code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2869" }, { "category": "external", "summary": "RHBZ#2118869", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2118869" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2869", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2869" } ], "release_date": "2021-12-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-01-12T09:27:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0095" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSamples8bits()" }, { "cve": "CVE-2022-2953", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2022-10-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2134432" } ], "notes": [ { "category": "description", "text": "An out-of-bound read flaw was found in LibTIFF, in extractImageSection in the tools/tiffcrop.c:6905, allowing attackers to cause a denial of service via a crafted tiff file.", "title": "Vulnerability description" }, { "category": "summary", "text": "libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2953" }, { "category": "external", "summary": "RHBZ#2134432", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134432" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2953", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2953" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2953", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2953" } ], "release_date": "2022-08-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-01-12T09:27:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0095" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "AppStream-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "AppStream-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.src", "CRB-8.7.0.Z.MAIN:libtiff-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debuginfo-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-debugsource-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-devel-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-0:4.0.9-26.el8_7.x86_64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.aarch64", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.i686", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.ppc64le", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.s390x", "CRB-8.7.0.Z.MAIN:libtiff-tools-debuginfo-0:4.0.9-26.el8_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c" } ] }
rhsa-2023_0302
Vulnerability from csaf_redhat
Published
2023-01-23 15:29
Modified
2024-11-22 20:39
Summary
Red Hat Security Advisory: libtiff security update
Notes
Topic
An update for libtiff is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* LibTiff: DoS from Divide By Zero Error (CVE-2022-2056, CVE-2022-2057, CVE-2022-2058)
* libtiff: Double free or corruption in rotateImage() function at tiffcrop.c (CVE-2022-2519)
* libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c (CVE-2022-2953)
* libtiff: Assertion fail in rotateImage() function at tiffcrop.c (CVE-2022-2520)
* libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c (CVE-2022-2521)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for libtiff is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.\n\nSecurity Fix(es):\n\n* LibTiff: DoS from Divide By Zero Error (CVE-2022-2056, CVE-2022-2057, CVE-2022-2058)\n\n* libtiff: Double free or corruption in rotateImage() function at tiffcrop.c (CVE-2022-2519)\n\n* libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c (CVE-2022-2953)\n\n* libtiff: Assertion fail in rotateImage() function at tiffcrop.c (CVE-2022-2520)\n\n* libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c (CVE-2022-2521)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:0302", "url": "https://access.redhat.com/errata/RHSA-2023:0302" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2103222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103222" }, { "category": "external", "summary": "2122789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122789" }, { "category": "external", "summary": "2122792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122792" }, { "category": "external", "summary": "2122799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122799" }, { "category": "external", "summary": "2134432", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134432" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0302.json" } ], "title": "Red Hat Security Advisory: libtiff security update", "tracking": { "current_release_date": "2024-11-22T20:39:55+00:00", "generator": { "date": "2024-11-22T20:39:55+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2023:0302", "initial_release_date": "2023-01-23T15:29:46+00:00", "revision_history": [ { "date": "2023-01-23T15:29:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-01-23T15:29:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T20:39:55+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } }, { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 9)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "libtiff-tools-0:4.4.0-5.el9_1.aarch64", "product": { "name": "libtiff-tools-0:4.4.0-5.el9_1.aarch64", "product_id": "libtiff-tools-0:4.4.0-5.el9_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-5.el9_1?arch=aarch64" } } }, { "category": "product_version", "name": "libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "product": { "name": "libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "product_id": "libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-5.el9_1?arch=aarch64" } } }, { "category": "product_version", "name": "libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "product": { "name": "libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "product_id": "libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-5.el9_1?arch=aarch64" } } }, { "category": "product_version", "name": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "product": { "name": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "product_id": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-5.el9_1?arch=aarch64" } } }, { "category": "product_version", "name": "libtiff-0:4.4.0-5.el9_1.aarch64", "product": { "name": "libtiff-0:4.4.0-5.el9_1.aarch64", "product_id": "libtiff-0:4.4.0-5.el9_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=aarch64" } } }, { "category": "product_version", "name": "libtiff-devel-0:4.4.0-5.el9_1.aarch64", "product": { "name": "libtiff-devel-0:4.4.0-5.el9_1.aarch64", "product_id": "libtiff-devel-0:4.4.0-5.el9_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "product": { "name": "libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "product_id": "libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-5.el9_1?arch=ppc64le" } } }, { "category": "product_version", "name": "libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "product": { "name": "libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "product_id": "libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-5.el9_1?arch=ppc64le" } } }, { "category": "product_version", "name": "libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "product": { "name": "libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "product_id": "libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-5.el9_1?arch=ppc64le" } } }, { "category": "product_version", "name": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "product": { "name": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "product_id": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-5.el9_1?arch=ppc64le" } } }, { "category": "product_version", "name": "libtiff-0:4.4.0-5.el9_1.ppc64le", "product": { "name": "libtiff-0:4.4.0-5.el9_1.ppc64le", "product_id": "libtiff-0:4.4.0-5.el9_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=ppc64le" } } }, { "category": "product_version", "name": "libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "product": { "name": "libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "product_id": "libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libtiff-tools-0:4.4.0-5.el9_1.x86_64", "product": { "name": "libtiff-tools-0:4.4.0-5.el9_1.x86_64", "product_id": "libtiff-tools-0:4.4.0-5.el9_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-5.el9_1?arch=x86_64" } } }, { "category": "product_version", "name": "libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "product": { "name": "libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "product_id": "libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-5.el9_1?arch=x86_64" } } }, { "category": "product_version", "name": "libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "product": { "name": "libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "product_id": "libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-5.el9_1?arch=x86_64" } } }, { "category": "product_version", "name": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64", "product": { "name": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64", "product_id": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-5.el9_1?arch=x86_64" } } }, { "category": "product_version", "name": "libtiff-0:4.4.0-5.el9_1.x86_64", "product": { "name": "libtiff-0:4.4.0-5.el9_1.x86_64", "product_id": "libtiff-0:4.4.0-5.el9_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64" } } }, { "category": "product_version", "name": "libtiff-devel-0:4.4.0-5.el9_1.x86_64", "product": { "name": "libtiff-devel-0:4.4.0-5.el9_1.x86_64", "product_id": "libtiff-devel-0:4.4.0-5.el9_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libtiff-tools-0:4.4.0-5.el9_1.s390x", "product": { "name": "libtiff-tools-0:4.4.0-5.el9_1.s390x", "product_id": "libtiff-tools-0:4.4.0-5.el9_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-5.el9_1?arch=s390x" } } }, { "category": "product_version", "name": "libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "product": { "name": "libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "product_id": "libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-5.el9_1?arch=s390x" } } }, { "category": "product_version", "name": "libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "product": { "name": "libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "product_id": "libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-5.el9_1?arch=s390x" } } }, { "category": "product_version", "name": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "product": { "name": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "product_id": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-5.el9_1?arch=s390x" } } }, { "category": "product_version", "name": "libtiff-0:4.4.0-5.el9_1.s390x", "product": { "name": "libtiff-0:4.4.0-5.el9_1.s390x", "product_id": "libtiff-0:4.4.0-5.el9_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=s390x" } } }, { "category": "product_version", "name": "libtiff-devel-0:4.4.0-5.el9_1.s390x", "product": { "name": "libtiff-devel-0:4.4.0-5.el9_1.s390x", "product_id": "libtiff-devel-0:4.4.0-5.el9_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libtiff-0:4.4.0-5.el9_1.src", "product": { "name": "libtiff-0:4.4.0-5.el9_1.src", "product_id": "libtiff-0:4.4.0-5.el9_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "libtiff-0:4.4.0-5.el9_1.i686", "product": { "name": "libtiff-0:4.4.0-5.el9_1.i686", "product_id": "libtiff-0:4.4.0-5.el9_1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=i686" } } }, { "category": "product_version", "name": "libtiff-devel-0:4.4.0-5.el9_1.i686", "product": { "name": "libtiff-devel-0:4.4.0-5.el9_1.i686", "product_id": "libtiff-devel-0:4.4.0-5.el9_1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=i686" } } }, { "category": "product_version", "name": "libtiff-debugsource-0:4.4.0-5.el9_1.i686", "product": { "name": "libtiff-debugsource-0:4.4.0-5.el9_1.i686", "product_id": "libtiff-debugsource-0:4.4.0-5.el9_1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-5.el9_1?arch=i686" } } }, { "category": "product_version", "name": "libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "product": { "name": "libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "product_id": "libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-5.el9_1?arch=i686" } } }, { "category": "product_version", "name": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "product": { "name": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "product_id": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-5.el9_1?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:4.4.0-5.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64" }, "product_reference": "libtiff-0:4.4.0-5.el9_1.aarch64", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:4.4.0-5.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686" }, "product_reference": "libtiff-0:4.4.0-5.el9_1.i686", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:4.4.0-5.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le" }, "product_reference": "libtiff-0:4.4.0-5.el9_1.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:4.4.0-5.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x" }, "product_reference": "libtiff-0:4.4.0-5.el9_1.s390x", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:4.4.0-5.el9_1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src" }, "product_reference": "libtiff-0:4.4.0-5.el9_1.src", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:4.4.0-5.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64" }, "product_reference": "libtiff-0:4.4.0-5.el9_1.x86_64", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64" }, "product_reference": "libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:4.4.0-5.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686" }, "product_reference": "libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le" }, "product_reference": "libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:4.4.0-5.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x" }, "product_reference": "libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64" }, "product_reference": "libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debugsource-0:4.4.0-5.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64" }, "product_reference": "libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debugsource-0:4.4.0-5.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686" }, "product_reference": "libtiff-debugsource-0:4.4.0-5.el9_1.i686", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le" }, "product_reference": "libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debugsource-0:4.4.0-5.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x" }, "product_reference": "libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debugsource-0:4.4.0-5.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64" }, "product_reference": "libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:4.4.0-5.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64" }, "product_reference": "libtiff-devel-0:4.4.0-5.el9_1.aarch64", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:4.4.0-5.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686" }, "product_reference": "libtiff-devel-0:4.4.0-5.el9_1.i686", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:4.4.0-5.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le" }, "product_reference": "libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:4.4.0-5.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x" }, "product_reference": "libtiff-devel-0:4.4.0-5.el9_1.s390x", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:4.4.0-5.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64" }, "product_reference": "libtiff-devel-0:4.4.0-5.el9_1.x86_64", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-0:4.4.0-5.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64" }, "product_reference": "libtiff-tools-0:4.4.0-5.el9_1.aarch64", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-0:4.4.0-5.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le" }, "product_reference": "libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-0:4.4.0-5.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x" }, "product_reference": "libtiff-tools-0:4.4.0-5.el9_1.s390x", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-0:4.4.0-5.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64" }, "product_reference": "libtiff-tools-0:4.4.0-5.el9_1.x86_64", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64" }, "product_reference": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686" }, "product_reference": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le" }, "product_reference": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x" }, "product_reference": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64" }, "product_reference": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64", "relates_to_product_reference": "AppStream-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:4.4.0-5.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64" }, "product_reference": "libtiff-0:4.4.0-5.el9_1.aarch64", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:4.4.0-5.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686" }, "product_reference": "libtiff-0:4.4.0-5.el9_1.i686", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:4.4.0-5.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le" }, "product_reference": "libtiff-0:4.4.0-5.el9_1.ppc64le", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:4.4.0-5.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x" }, "product_reference": "libtiff-0:4.4.0-5.el9_1.s390x", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:4.4.0-5.el9_1.src as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src" }, "product_reference": "libtiff-0:4.4.0-5.el9_1.src", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-0:4.4.0-5.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64" }, "product_reference": "libtiff-0:4.4.0-5.el9_1.x86_64", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64" }, "product_reference": "libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:4.4.0-5.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686" }, "product_reference": "libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le" }, "product_reference": "libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:4.4.0-5.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x" }, "product_reference": "libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64" }, "product_reference": "libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debugsource-0:4.4.0-5.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64" }, "product_reference": "libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debugsource-0:4.4.0-5.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686" }, "product_reference": "libtiff-debugsource-0:4.4.0-5.el9_1.i686", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le" }, "product_reference": "libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debugsource-0:4.4.0-5.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x" }, "product_reference": "libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-debugsource-0:4.4.0-5.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64" }, "product_reference": "libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:4.4.0-5.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64" }, "product_reference": "libtiff-devel-0:4.4.0-5.el9_1.aarch64", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:4.4.0-5.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686" }, "product_reference": "libtiff-devel-0:4.4.0-5.el9_1.i686", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:4.4.0-5.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le" }, "product_reference": "libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:4.4.0-5.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x" }, "product_reference": "libtiff-devel-0:4.4.0-5.el9_1.s390x", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-devel-0:4.4.0-5.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64" }, "product_reference": "libtiff-devel-0:4.4.0-5.el9_1.x86_64", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-0:4.4.0-5.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64" }, "product_reference": "libtiff-tools-0:4.4.0-5.el9_1.aarch64", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-0:4.4.0-5.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le" }, "product_reference": "libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-0:4.4.0-5.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x" }, "product_reference": "libtiff-tools-0:4.4.0-5.el9_1.s390x", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-0:4.4.0-5.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64" }, "product_reference": "libtiff-tools-0:4.4.0-5.el9_1.x86_64", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64" }, "product_reference": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686" }, "product_reference": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le" }, "product_reference": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x" }, "product_reference": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64" }, "product_reference": "libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64", "relates_to_product_reference": "CRB-9.1.0.Z.MAIN" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2056", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "discovery_date": "2022-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2103222" } ], "notes": [ { "category": "description", "text": "A divide-by-zero vulnerability was found in libtiff. This flaw allows an attacker to cause a denial of service via a crafted tiff file.", "title": "Vulnerability description" }, { "category": "summary", "text": "libtiff: division by zero issues in tiffcrop", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2056" }, { "category": "external", "summary": "RHBZ#2103222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103222" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2056", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2056" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2056", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2056" } ], "release_date": "2022-06-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-01-23T15:29:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0302" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libtiff: division by zero issues in tiffcrop" }, { "cve": "CVE-2022-2057", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "discovery_date": "2022-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2103222" } ], "notes": [ { "category": "description", "text": "A divide-by-zero vulnerability was found in libtiff. This flaw allows an attacker to cause a denial of service via a crafted tiff file.", "title": "Vulnerability description" }, { "category": "summary", "text": "libtiff: division by zero issues in tiffcrop", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2057" }, { "category": "external", "summary": "RHBZ#2103222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103222" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2057", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2057" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2057", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2057" } ], "release_date": "2022-06-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-01-23T15:29:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0302" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libtiff: division by zero issues in tiffcrop" }, { "cve": "CVE-2022-2058", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "discovery_date": "2022-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2103222" } ], "notes": [ { "category": "description", "text": "A divide-by-zero vulnerability was found in libtiff. This flaw allows an attacker to cause a denial of service via a crafted tiff file.", "title": "Vulnerability description" }, { "category": "summary", "text": "libtiff: division by zero issues in tiffcrop", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2058" }, { "category": "external", "summary": "RHBZ#2103222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103222" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2058", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2058" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2058", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2058" } ], "release_date": "2022-06-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-01-23T15:29:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0302" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libtiff: division by zero issues in tiffcrop" }, { "cve": "CVE-2022-2519", "cwe": { "id": "CWE-415", "name": "Double Free" }, "discovery_date": "2022-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2122789" } ], "notes": [ { "category": "description", "text": "A double-free flaw was found in the tiffcrop tool distributed with the libtiff tools package. The double-free issue leads to a denial of service, impacting the availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libtiff: Double free or corruption in rotateImage() function at tiffcrop.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2519" }, { "category": "external", "summary": "RHBZ#2122789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122789" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2519", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2519" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2519", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2519" } ], "release_date": "2022-05-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-01-23T15:29:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0302" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libtiff: Double free or corruption in rotateImage() function at tiffcrop.c" }, { "cve": "CVE-2022-2520", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "discovery_date": "2022-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2122792" } ], "notes": [ { "category": "description", "text": "A flaw was found in libtiff 4.4.0rc1. There is a sysmalloc assertion fail in rotateImage() at tiffcrop.c:8621 that can cause program crash when reading a crafted input.", "title": "Vulnerability description" }, { "category": "summary", "text": "libtiff: Assertion fail in rotateImage() function at tiffcrop.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2520" }, { "category": "external", "summary": "RHBZ#2122792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122792" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2520", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2520" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2520", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2520" } ], "release_date": "2022-05-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-01-23T15:29:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0302" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libtiff: Assertion fail in rotateImage() function at tiffcrop.c" }, { "cve": "CVE-2022-2521", "cwe": { "id": "CWE-763", "name": "Release of Invalid Pointer or Reference" }, "discovery_date": "2022-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2122799" } ], "notes": [ { "category": "description", "text": "It was found in libtiff 4.4.0rc1 that there is an invalid pointer free operation in TIFFClose() at tif_close.c:131 called by tiffcrop.c:2522 that can cause a program crash and denial of service while processing crafted input.", "title": "Vulnerability description" }, { "category": "summary", "text": "libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2521" }, { "category": "external", "summary": "RHBZ#2122799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122799" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2521", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2521" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2521", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2521" } ], "release_date": "2022-05-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-01-23T15:29:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0302" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c" }, { "cve": "CVE-2022-2953", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2022-10-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2134432" } ], "notes": [ { "category": "description", "text": "An out-of-bound read flaw was found in LibTIFF, in extractImageSection in the tools/tiffcrop.c:6905, allowing attackers to cause a denial of service via a crafted tiff file.", "title": "Vulnerability description" }, { "category": "summary", "text": "libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2953" }, { "category": "external", "summary": "RHBZ#2134432", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134432" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2953", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2953" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2953", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2953" } ], "release_date": "2022-08-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-01-23T15:29:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0302" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "AppStream-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "AppStream-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.src", "CRB-9.1.0.Z.MAIN:libtiff-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debuginfo-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-debugsource-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-devel-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-0:4.4.0-5.el9_1.x86_64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.aarch64", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.i686", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.ppc64le", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.s390x", "CRB-9.1.0.Z.MAIN:libtiff-tools-debuginfo-0:4.4.0-5.el9_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c" } ] }
wid-sec-w-2022-1216
Vulnerability from csaf_certbund
Published
2022-08-29 22:00
Modified
2023-01-29 23:00
Summary
libTIFF: Schwachstelle ermöglicht Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
libTIFF ist ein Softwarepaket für die Verarbeitung von Bilddateien in Tag Image File Format (TIFF).
Angriff
Ein lokaler Angreifer kann eine Schwachstelle in libTIFF ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- UNIX
- Linux
- MacOS X
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "libTIFF ist ein Softwarepaket f\u00fcr die Verarbeitung von Bilddateien in Tag Image File Format (TIFF).", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann eine Schwachstelle in libTIFF ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- MacOS X", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1216 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1216.json" }, { "category": "self", "summary": "WID-SEC-2022-1216 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1216" }, { "category": "external", "summary": "Debian Security Advisory DSA-5333 vom 2023-01-29", "url": "https://www.debian.org/security/2023/dsa-5333" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:0302 vom 2023-01-23", "url": "https://access.redhat.com/errata/RHSA-2023:0302" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-0302 vom 2023-01-24", "url": "https://linux.oracle.com/errata/ELSA-2023-0302.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-0095 vom 2023-01-12", "url": "https://linux.oracle.com/errata/ELSA-2023-0095.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:0095 vom 2023-01-12", "url": "https://access.redhat.com/errata/RHSA-2023:0095" }, { "category": "external", "summary": "NIST Database vom 2022-08-29", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2953" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5714-1 vom 2022-11-08", "url": "https://ubuntu.com/security/notices/USN-5714-1" } ], "source_lang": "en-US", "title": "libTIFF: Schwachstelle erm\u00f6glicht Denial of Service", "tracking": { "current_release_date": "2023-01-29T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:34:08.822+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-1216", "initial_release_date": "2022-08-29T22:00:00.000+00:00", "revision_history": [ { "date": "2022-08-29T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-11-07T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-01-11T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-01-12T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-01-23T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2023-01-29T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Debian aufgenommen" } ], "status": "final", "version": "6" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source libTIFF \u003c 4.4.0", "product": { "name": "Open Source libTIFF \u003c 4.4.0", "product_id": "T023665", "product_identification_helper": { "cpe": "cpe:/a:libtiff:libtiff:4.4.0" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2953", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in libTIFF. Diese ist auf einen Out-of-Bounds-Lesefehler zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "67646", "T000126", "T004914" ] }, "release_date": "2022-08-29T22:00:00.000+00:00", "title": "CVE-2022-2953" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.