Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-4645 (GCVE-0-2022-4645)
Vulnerability from cvelistv5
- Out-of-bounds read in libtiff
{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T01:48:39.676Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.com/libtiff/libtiff/-/issues/277"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json"
          },
          {
            "name": "FEDORA-2023-6c1200da3d",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BA6GRCAQ7NR2OK5N44UQRGUJBIYKWJJH/"
          },
          {
            "name": "FEDORA-2023-f5d075f7f2",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZTFA6GGOKFPIQNHDBMXYUR4XUXUJESE/"
          },
          {
            "name": "FEDORA-2023-40b675d7ae",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLM763GGZVVOAXIQXG6YGTYJ5VFYNECQ/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20230331-0001/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-4645",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-05T20:04:27.466331Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-125",
                "description": "CWE-125 Out-of-bounds Read",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-04T20:37:39.327Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "libtiff",
          "vendor": "libtiff",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=4.4.0"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "wangdw.augustus@gmail.com"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Out-of-bounds read in libtiff",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-03-31T00:00:00.000Z",
        "orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a",
        "shortName": "GitLab"
      },
      "references": [
        {
          "url": "https://gitlab.com/libtiff/libtiff/-/issues/277"
        },
        {
          "url": "https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246"
        },
        {
          "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json"
        },
        {
          "name": "FEDORA-2023-6c1200da3d",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BA6GRCAQ7NR2OK5N44UQRGUJBIYKWJJH/"
        },
        {
          "name": "FEDORA-2023-f5d075f7f2",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZTFA6GGOKFPIQNHDBMXYUR4XUXUJESE/"
        },
        {
          "name": "FEDORA-2023-40b675d7ae",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLM763GGZVVOAXIQXG6YGTYJ5VFYNECQ/"
        },
        {
          "url": "https://security.netapp.com/advisory/ntap-20230331-0001/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a",
    "assignerShortName": "GitLab",
    "cveId": "CVE-2022-4645",
    "datePublished": "2023-03-03T00:00:00.000Z",
    "dateReserved": "2022-12-22T00:00:00.000Z",
    "dateUpdated": "2025-04-04T20:37:39.327Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-4645\",\"sourceIdentifier\":\"cve@gitlab.com\",\"published\":\"2023-03-03T16:15:09.777\",\"lastModified\":\"2025-04-04T21:15:42.243\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve@gitlab.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.5,\"impactScore\":4.2},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E30D0E6F-4AE8-4284-8716-991DFA48CC5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC559B26-5DFC-4B7A-A27C-B77DE755DFF9\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.5.1\",\"versionEndIncluding\":\"4.4.0\",\"matchCriteriaId\":\"E05D8B0C-6AE1-497D-96BF-374E0D63321A\"}]}]}],\"references\":[{\"url\":\"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json\",\"source\":\"cve@gitlab.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246\",\"source\":\"cve@gitlab.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://gitlab.com/libtiff/libtiff/-/issues/277\",\"source\":\"cve@gitlab.com\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZTFA6GGOKFPIQNHDBMXYUR4XUXUJESE/\",\"source\":\"cve@gitlab.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BA6GRCAQ7NR2OK5N44UQRGUJBIYKWJJH/\",\"source\":\"cve@gitlab.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLM763GGZVVOAXIQXG6YGTYJ5VFYNECQ/\",\"source\":\"cve@gitlab.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20230331-0001/\",\"source\":\"cve@gitlab.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://gitlab.com/libtiff/libtiff/-/issues/277\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZTFA6GGOKFPIQNHDBMXYUR4XUXUJESE/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BA6GRCAQ7NR2OK5N44UQRGUJBIYKWJJH/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLM763GGZVVOAXIQXG6YGTYJ5VFYNECQ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20230331-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}],\"evaluatorComment\":\"n\"}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://gitlab.com/libtiff/libtiff/-/issues/277\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BA6GRCAQ7NR2OK5N44UQRGUJBIYKWJJH/\", \"name\": \"FEDORA-2023-6c1200da3d\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZTFA6GGOKFPIQNHDBMXYUR4XUXUJESE/\", \"name\": \"FEDORA-2023-f5d075f7f2\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLM763GGZVVOAXIQXG6YGTYJ5VFYNECQ/\", \"name\": \"FEDORA-2023-40b675d7ae\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20230331-0001/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T01:48:39.676Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-4645\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-05T20:04:27.466331Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-125\", \"description\": \"CWE-125 Out-of-bounds Read\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-05T20:03:01.968Z\"}}], \"cna\": {\"credits\": [{\"lang\": \"en\", \"value\": \"wangdw.augustus@gmail.com\"}], \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}], \"affected\": [{\"vendor\": \"libtiff\", \"product\": \"libtiff\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c=4.4.0\"}]}], \"references\": [{\"url\": \"https://gitlab.com/libtiff/libtiff/-/issues/277\"}, {\"url\": \"https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246\"}, {\"url\": \"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BA6GRCAQ7NR2OK5N44UQRGUJBIYKWJJH/\", \"name\": \"FEDORA-2023-6c1200da3d\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZTFA6GGOKFPIQNHDBMXYUR4XUXUJESE/\", \"name\": \"FEDORA-2023-f5d075f7f2\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLM763GGZVVOAXIQXG6YGTYJ5VFYNECQ/\", \"name\": \"FEDORA-2023-40b675d7ae\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20230331-0001/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Out-of-bounds read in libtiff\"}]}], \"providerMetadata\": {\"orgId\": \"ceab7361-8a18-47b1-92ba-4d7d25f6715a\", \"shortName\": \"GitLab\", \"dateUpdated\": \"2023-03-31T00:00:00.000Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2022-4645\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-04T20:37:39.327Z\", \"dateReserved\": \"2022-12-22T00:00:00.000Z\", \"assignerOrgId\": \"ceab7361-8a18-47b1-92ba-4d7d25f6715a\", \"datePublished\": \"2023-03-03T00:00:00.000Z\", \"assignerShortName\": \"GitLab\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}
  WID-SEC-W-2023-0570
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "libTIFF ist ein Softwarepaket f\u00fcr die Verarbeitung von Bilddateien in Tag Image File Format (TIFF).",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in libTIFF ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux\n- MacOS X\n- Sonstiges\n- UNIX",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2023-0570 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0570.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2023-0570 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0570"
      },
      {
        "category": "external",
        "summary": "Github Security Advisory GHSA-6FR2-GJ2W-XGR6 vom 2023-03-05",
        "url": "https://github.com/advisories/GHSA-6fr2-gj2w-xgr6"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-40B675D7AE vom 2023-03-08",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-40b675d7ae"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-F5D075F7F2 vom 2023-03-08",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-f5d075f7f2"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-6C1200DA3D vom 2023-03-08",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-6c1200da3d"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:2340 vom 2023-05-09",
        "url": "https://access.redhat.com/errata/RHSA-2023:2340"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3059 vom 2024-05-22",
        "url": "https://access.redhat.com/errata/RHSA-2024:3059"
      }
    ],
    "source_lang": "en-US",
    "title": "libTIFF: Schwachstelle erm\u00f6glicht Denial of Service",
    "tracking": {
      "current_release_date": "2024-05-21T22:00:00.000+00:00",
      "generator": {
        "date": "2024-08-15T17:46:11.577+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.5"
        }
      },
      "id": "WID-SEC-W-2023-0570",
      "initial_release_date": "2023-03-05T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2023-03-05T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2023-03-07T23:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Fedora aufgenommen"
        },
        {
          "date": "2023-05-09T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-05-21T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Red Hat aufgenommen"
        }
      ],
      "status": "final",
      "version": "4"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Fedora Linux",
            "product": {
              "name": "Fedora Linux",
              "product_id": "74185",
              "product_identification_helper": {
                "cpe": "cpe:/o:fedoraproject:fedora:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Fedora"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "4.4.0",
                "product": {
                  "name": "Open Source libTIFF 4.4.0",
                  "product_id": "T023665",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:libtiff:libtiff:4.4.0"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "libTIFF"
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux",
            "product": {
              "name": "Red Hat Enterprise Linux",
              "product_id": "67646",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:enterprise_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-4645",
      "notes": [
        {
          "category": "description",
          "text": "Es existiert eine Schwachstelle in libTIFF. Diese ist auf einen out-of-bounds-Lesefehler zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
        }
      ],
      "product_status": {
        "known_affected": [
          "T023665",
          "67646",
          "74185"
        ]
      },
      "release_date": "2023-03-05T23:00:00.000+00:00",
      "title": "CVE-2022-4645"
    }
  ]
}
  wid-sec-w-2023-0570
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "libTIFF ist ein Softwarepaket f\u00fcr die Verarbeitung von Bilddateien in Tag Image File Format (TIFF).",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in libTIFF ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux\n- MacOS X\n- Sonstiges\n- UNIX",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2023-0570 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0570.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2023-0570 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0570"
      },
      {
        "category": "external",
        "summary": "Github Security Advisory GHSA-6FR2-GJ2W-XGR6 vom 2023-03-05",
        "url": "https://github.com/advisories/GHSA-6fr2-gj2w-xgr6"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-40B675D7AE vom 2023-03-08",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-40b675d7ae"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-F5D075F7F2 vom 2023-03-08",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-f5d075f7f2"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-6C1200DA3D vom 2023-03-08",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-6c1200da3d"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:2340 vom 2023-05-09",
        "url": "https://access.redhat.com/errata/RHSA-2023:2340"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3059 vom 2024-05-22",
        "url": "https://access.redhat.com/errata/RHSA-2024:3059"
      }
    ],
    "source_lang": "en-US",
    "title": "libTIFF: Schwachstelle erm\u00f6glicht Denial of Service",
    "tracking": {
      "current_release_date": "2024-05-21T22:00:00.000+00:00",
      "generator": {
        "date": "2024-08-15T17:46:11.577+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.5"
        }
      },
      "id": "WID-SEC-W-2023-0570",
      "initial_release_date": "2023-03-05T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2023-03-05T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2023-03-07T23:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Fedora aufgenommen"
        },
        {
          "date": "2023-05-09T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-05-21T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Red Hat aufgenommen"
        }
      ],
      "status": "final",
      "version": "4"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Fedora Linux",
            "product": {
              "name": "Fedora Linux",
              "product_id": "74185",
              "product_identification_helper": {
                "cpe": "cpe:/o:fedoraproject:fedora:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Fedora"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "4.4.0",
                "product": {
                  "name": "Open Source libTIFF 4.4.0",
                  "product_id": "T023665",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:libtiff:libtiff:4.4.0"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "libTIFF"
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux",
            "product": {
              "name": "Red Hat Enterprise Linux",
              "product_id": "67646",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:enterprise_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-4645",
      "notes": [
        {
          "category": "description",
          "text": "Es existiert eine Schwachstelle in libTIFF. Diese ist auf einen out-of-bounds-Lesefehler zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
        }
      ],
      "product_status": {
        "known_affected": [
          "T023665",
          "67646",
          "74185"
        ]
      },
      "release_date": "2023-03-05T23:00:00.000+00:00",
      "title": "CVE-2022-4645"
    }
  ]
}
  CERTFR-2024-AVI-1103
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | Cognos Analytics versions 12.0.x antérieures à 12.0.4 | ||
| IBM | Sterling | Sterling External Authentication Server versions 6.1.0.x antérieures à 6.1.0.2 ifix 01 | ||
| IBM | QRadar SIEM | Security QRadar Log Management AQL Plugin versions antérieures à 1.1.0 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.0.x antérieures à 6.0.3.1 (fixpack) GA | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 11.2.4 FP5 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.1.x antérieures à 6.1.0.1 (fixpack) GA | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.2.x antérieures à 6.2.0.0 ifix 01 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions 6.3.x antérieures à 6.3.0.11_ifix001 | 
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | ||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Cognos Analytics versions 12.0.x ant\u00e9rieures \u00e0 12.0.4",
      "product": {
        "name": "Cognos Analytics",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sterling External Authentication Server versions 6.1.0.x ant\u00e9rieures \u00e0 6.1.0.2 ifix 01",
      "product": {
        "name": "Sterling",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": " Security QRadar Log Management AQL Plugin versions ant\u00e9rieures \u00e0 1.1.0",
      "product": {
        "name": "QRadar SIEM",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sterling Secure Proxy versions 6.0.x ant\u00e9rieures \u00e0 6.0.3.1 (fixpack) GA",
      "product": {
        "name": "Sterling",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 FP5",
      "product": {
        "name": "Cognos Analytics",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sterling Secure Proxy versions 6.1.x ant\u00e9rieures \u00e0 6.1.0.1 (fixpack) GA",
      "product": {
        "name": "Sterling",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sterling Secure Proxy versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.0 ifix 01",
      "product": {
        "name": "Sterling",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sterling Connect:Direct Web Services versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.11_ifix001",
      "product": {
        "name": "Sterling Connect:Direct",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2010-1205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-1205"
    },
    {
      "name": "CVE-2014-1544",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-1544"
    },
    {
      "name": "CVE-2014-1568",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-1568"
    },
    {
      "name": "CVE-2015-7182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-7182"
    },
    {
      "name": "CVE-2015-7181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-7181"
    },
    {
      "name": "CVE-2015-7575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-7575"
    },
    {
      "name": "CVE-2016-1938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-1938"
    },
    {
      "name": "CVE-2017-5461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-5461"
    },
    {
      "name": "CVE-2018-12384",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12384"
    },
    {
      "name": "CVE-2019-7317",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
    },
    {
      "name": "CVE-2019-11729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
    },
    {
      "name": "CVE-2019-11727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
    },
    {
      "name": "CVE-2019-11719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
    },
    {
      "name": "CVE-2018-12404",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12404"
    },
    {
      "name": "CVE-2019-11756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
    },
    {
      "name": "CVE-2019-11745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
    },
    {
      "name": "CVE-2019-8331",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8331"
    },
    {
      "name": "CVE-2019-11358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11358"
    },
    {
      "name": "CVE-2019-17023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
    },
    {
      "name": "CVE-2020-11022",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
    },
    {
      "name": "CVE-2020-11023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
    },
    {
      "name": "CVE-2020-12400",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
    },
    {
      "name": "CVE-2020-12401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
    },
    {
      "name": "CVE-2020-6829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
    },
    {
      "name": "CVE-2019-17006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
    },
    {
      "name": "CVE-2018-18508",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-18508"
    },
    {
      "name": "CVE-2019-17007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-17007"
    },
    {
      "name": "CVE-2018-20677",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-20677"
    },
    {
      "name": "CVE-2018-14040",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-14040"
    },
    {
      "name": "CVE-2018-14042",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-14042"
    },
    {
      "name": "CVE-2016-10735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-10735"
    },
    {
      "name": "CVE-2018-20676",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-20676"
    },
    {
      "name": "CVE-2017-12652",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12652"
    },
    {
      "name": "CVE-2020-25648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25648"
    },
    {
      "name": "CVE-2022-23990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23990"
    },
    {
      "name": "CVE-2021-45960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
    },
    {
      "name": "CVE-2022-22827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
    },
    {
      "name": "CVE-2022-22825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
    },
    {
      "name": "CVE-2022-22824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
    },
    {
      "name": "CVE-2022-22826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
    },
    {
      "name": "CVE-2022-23852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
    },
    {
      "name": "CVE-2022-22823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
    },
    {
      "name": "CVE-2020-12403",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
    },
    {
      "name": "CVE-2021-38153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38153"
    },
    {
      "name": "CVE-2021-43138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43138"
    },
    {
      "name": "CVE-2022-34749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34749"
    },
    {
      "name": "CVE-2022-40897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
    },
    {
      "name": "CVE-2023-0286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
    },
    {
      "name": "CVE-2023-0767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
    },
    {
      "name": "CVE-2023-23931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
    },
    {
      "name": "CVE-2023-2650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
    },
    {
      "name": "CVE-2023-31130",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31130"
    },
    {
      "name": "CVE-2023-32067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
    },
    {
      "name": "CVE-2023-25194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25194"
    },
    {
      "name": "CVE-2023-3446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
    },
    {
      "name": "CVE-2023-32681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
    },
    {
      "name": "CVE-2023-38325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
    },
    {
      "name": "CVE-2023-4807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
    },
    {
      "name": "CVE-2023-30774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
    },
    {
      "name": "CVE-2023-5678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
    },
    {
      "name": "CVE-2023-40217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
    },
    {
      "name": "CVE-2023-4813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
    },
    {
      "name": "CVE-2023-4806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
    },
    {
      "name": "CVE-2020-19189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-19189"
    },
    {
      "name": "CVE-2023-5156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
    },
    {
      "name": "CVE-2021-46848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
    },
    {
      "name": "CVE-2022-21699",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21699"
    },
    {
      "name": "CVE-2023-6237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
    },
    {
      "name": "CVE-2023-30086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
    },
    {
      "name": "CVE-2023-26965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
    },
    {
      "name": "CVE-2023-3316",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
    },
    {
      "name": "CVE-2023-6129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
    },
    {
      "name": "CVE-2022-48554",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
    },
    {
      "name": "CVE-2020-23064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-23064"
    },
    {
      "name": "CVE-2023-5388",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
    },
    {
      "name": "CVE-2023-49083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
    },
    {
      "name": "CVE-2024-25710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
    },
    {
      "name": "CVE-2024-26308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
    },
    {
      "name": "CVE-2024-22195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
    },
    {
      "name": "CVE-2023-50782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
    },
    {
      "name": "CVE-2023-52426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
    },
    {
      "name": "CVE-2024-21011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
    },
    {
      "name": "CVE-2024-21094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
    },
    {
      "name": "CVE-2024-21085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
    },
    {
      "name": "CVE-2024-29133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29133"
    },
    {
      "name": "CVE-2024-29131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29131"
    },
    {
      "name": "CVE-2024-28849",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28849"
    },
    {
      "name": "CVE-2024-22201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22201"
    },
    {
      "name": "CVE-2024-25629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
    },
    {
      "name": "CVE-2023-52425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
    },
    {
      "name": "CVE-2024-4367",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4367"
    },
    {
      "name": "CVE-2024-27983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
    },
    {
      "name": "CVE-2023-51074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
    },
    {
      "name": "CVE-2024-23944",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23944"
    },
    {
      "name": "CVE-2023-38264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38264"
    },
    {
      "name": "CVE-2024-29025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
    },
    {
      "name": "CVE-2024-34102",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34102"
    },
    {
      "name": "CVE-2024-28757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
    },
    {
      "name": "CVE-2024-29041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29041"
    },
    {
      "name": "CVE-2024-29857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
    },
    {
      "name": "CVE-2024-30171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
    },
    {
      "name": "CVE-2024-30172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
    },
    {
      "name": "CVE-2021-36770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
    },
    {
      "name": "CVE-2024-2398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
    },
    {
      "name": "CVE-2024-28176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28176"
    },
    {
      "name": "CVE-2024-28863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28863"
    },
    {
      "name": "CVE-2024-4067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
    },
    {
      "name": "CVE-2024-4068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4068"
    },
    {
      "name": "CVE-2023-50495",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
    },
    {
      "name": "CVE-2024-27982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
    },
    {
      "name": "CVE-2023-52356",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52356"
    },
    {
      "name": "CVE-2023-6228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
    },
    {
      "name": "CVE-2023-6277",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
    },
    {
      "name": "CVE-2024-6345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
    },
    {
      "name": "CVE-2024-37890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37890"
    },
    {
      "name": "CVE-2024-39008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39008"
    },
    {
      "name": "CVE-2023-3164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
    },
    {
      "name": "CVE-2024-22018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
    },
    {
      "name": "CVE-2024-22020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22020"
    },
    {
      "name": "CVE-2024-27980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27980"
    },
    {
      "name": "CVE-2024-36137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36137"
    },
    {
      "name": "CVE-2024-36138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36138"
    },
    {
      "name": "CVE-2024-37372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37372"
    },
    {
      "name": "CVE-2024-39338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
    },
    {
      "name": "CVE-2024-7264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
    },
    {
      "name": "CVE-2024-22871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22871"
    },
    {
      "name": "CVE-2018-15209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-15209"
    },
    {
      "name": "CVE-2023-37536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37536"
    },
    {
      "name": "CVE-2024-45296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
    },
    {
      "name": "CVE-2024-34447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
    },
    {
      "name": "CVE-2024-43796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43796"
    },
    {
      "name": "CVE-2024-45590",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
    },
    {
      "name": "CVE-2018-14041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-14041"
    },
    {
      "name": "CVE-2024-36114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36114"
    },
    {
      "name": "CVE-2024-25638",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25638"
    },
    {
      "name": "CVE-2024-51504",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-51504"
    },
    {
      "name": "CVE-2024-7006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7006"
    },
    {
      "name": "CVE-2013-2099",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-2099"
    },
    {
      "name": "CVE-2014-1569",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-1569"
    },
    {
      "name": "CVE-2017-11613",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11613"
    },
    {
      "name": "CVE-2017-11695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11695"
    },
    {
      "name": "CVE-2017-11696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11696"
    },
    {
      "name": "CVE-2017-11697",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11697"
    },
    {
      "name": "CVE-2017-11698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11698"
    },
    {
      "name": "CVE-2017-12627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12627"
    },
    {
      "name": "CVE-2017-18013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-18013"
    },
    {
      "name": "CVE-2017-18869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-18869"
    },
    {
      "name": "CVE-2017-9937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
    },
    {
      "name": "CVE-2018-16335",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-16335"
    },
    {
      "name": "CVE-2018-17000",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-17000"
    },
    {
      "name": "CVE-2018-17100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-17100"
    },
    {
      "name": "CVE-2018-17101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-17101"
    },
    {
      "name": "CVE-2018-19210",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-19210"
    },
    {
      "name": "CVE-2018-5784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-5784"
    },
    {
      "name": "CVE-2018-7456",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-7456"
    },
    {
      "name": "CVE-2019-10255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10255"
    },
    {
      "name": "CVE-2019-14973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14973"
    },
    {
      "name": "CVE-2019-17546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-17546"
    },
    {
      "name": "CVE-2019-6128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-6128"
    },
    {
      "name": "CVE-2020-15110",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15110"
    },
    {
      "name": "CVE-2020-18768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-18768"
    },
    {
      "name": "CVE-2020-19131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-19131"
    },
    {
      "name": "CVE-2020-19144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-19144"
    },
    {
      "name": "CVE-2020-26261",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26261"
    },
    {
      "name": "CVE-2020-35521",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35521"
    },
    {
      "name": "CVE-2020-35522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35522"
    },
    {
      "name": "CVE-2020-35523",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35523"
    },
    {
      "name": "CVE-2020-35524",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35524"
    },
    {
      "name": "CVE-2020-36191",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36191"
    },
    {
      "name": "CVE-2021-32862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32862"
    },
    {
      "name": "CVE-2022-0561",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
    },
    {
      "name": "CVE-2022-0562",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
    },
    {
      "name": "CVE-2022-0891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0891"
    },
    {
      "name": "CVE-2022-0908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
    },
    {
      "name": "CVE-2022-2056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
    },
    {
      "name": "CVE-2022-2057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
    },
    {
      "name": "CVE-2022-2058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
    },
    {
      "name": "CVE-2022-22844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
    },
    {
      "name": "CVE-2022-2867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
    },
    {
      "name": "CVE-2022-2868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
    },
    {
      "name": "CVE-2022-2869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
    },
    {
      "name": "CVE-2022-34266",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34266"
    },
    {
      "name": "CVE-2022-34526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
    },
    {
      "name": "CVE-2022-3479",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3479"
    },
    {
      "name": "CVE-2022-3570",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
    },
    {
      "name": "CVE-2022-3597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
    },
    {
      "name": "CVE-2022-3598",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
    },
    {
      "name": "CVE-2022-3599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
    },
    {
      "name": "CVE-2022-3626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
    },
    {
      "name": "CVE-2022-3627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
    },
    {
      "name": "CVE-2022-40090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
    },
    {
      "name": "CVE-2022-4645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
    },
    {
      "name": "CVE-2023-0795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
    },
    {
      "name": "CVE-2023-0796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
    },
    {
      "name": "CVE-2023-0797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
    },
    {
      "name": "CVE-2023-0798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
    },
    {
      "name": "CVE-2023-0799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
    },
    {
      "name": "CVE-2023-0800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
    },
    {
      "name": "CVE-2023-0801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
    },
    {
      "name": "CVE-2023-0802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
    },
    {
      "name": "CVE-2023-0803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
    },
    {
      "name": "CVE-2023-0804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
    },
    {
      "name": "CVE-2023-1916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
    },
    {
      "name": "CVE-2023-24816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24816"
    },
    {
      "name": "CVE-2023-25434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25434"
    },
    {
      "name": "CVE-2023-25435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25435"
    },
    {
      "name": "CVE-2023-2731",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
    },
    {
      "name": "CVE-2023-2908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
    },
    {
      "name": "CVE-2023-30775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30775"
    },
    {
      "name": "CVE-2023-3576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
    },
    {
      "name": "CVE-2023-38288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38288"
    },
    {
      "name": "CVE-2023-38289",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38289"
    },
    {
      "name": "CVE-2023-40745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
    },
    {
      "name": "CVE-2023-41175",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
    },
    {
      "name": "CVE-2023-41334",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41334"
    },
    {
      "name": "CVE-2023-4421",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4421"
    },
    {
      "name": "CVE-2023-4759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4759"
    },
    {
      "name": "CVE-2023-50291",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50291"
    },
    {
      "name": "CVE-2023-50292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50292"
    },
    {
      "name": "CVE-2023-50298",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50298"
    },
    {
      "name": "CVE-2023-50386",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50386"
    },
    {
      "name": "CVE-2023-50447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50447"
    },
    {
      "name": "CVE-2024-25016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25016"
    },
    {
      "name": "CVE-2024-29896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29896"
    },
    {
      "name": "CVE-2024-33883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33883"
    },
    {
      "name": "CVE-2024-38337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38337"
    },
    {
      "name": "CVE-2024-41752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41752"
    },
    {
      "name": "CVE-2024-45082",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45082"
    }
  ],
  "initial_release_date": "2024-12-20T00:00:00",
  "last_revision_date": "2024-12-20T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-1103",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-12-20T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    },
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
  "vendor_advisories": [
    {
      "published_at": "2024-12-17",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7177142",
      "url": "https://www.ibm.com/support/pages/node/7177142"
    },
    {
      "published_at": "2024-12-17",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7177223",
      "url": "https://www.ibm.com/support/pages/node/7177223"
    },
    {
      "published_at": "2024-12-16",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7179044",
      "url": "https://www.ibm.com/support/pages/node/7179044"
    },
    {
      "published_at": "2024-12-17",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7179156",
      "url": "https://www.ibm.com/support/pages/node/7179156"
    },
    {
      "published_at": "2024-12-17",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7179166",
      "url": "https://www.ibm.com/support/pages/node/7179166"
    },
    {
      "published_at": "2024-12-13",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7178835",
      "url": "https://www.ibm.com/support/pages/node/7178835"
    }
  ]
}
  rhsa-2024_3059
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for libtiff is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.\n\nSecurity Fix(es):\n\n* libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c (CVE-2022-4645)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.10 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:3059",
        "url": "https://access.redhat.com/errata/RHSA-2024:3059"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index"
      },
      {
        "category": "external",
        "summary": "2176220",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176220"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3059.json"
      }
    ],
    "title": "Red Hat Security Advisory: libtiff security update",
    "tracking": {
      "current_release_date": "2024-11-22T21:21:19+00:00",
      "generator": {
        "date": "2024-11-22T21:21:19+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2024:3059",
      "initial_release_date": "2024-05-22T09:28:57+00:00",
      "revision_history": [
        {
          "date": "2024-05-22T09:28:57+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-22T09:28:57+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T21:21:19+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.10.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux CRB (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux CRB (v. 8)",
                  "product_id": "CRB-8.10.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-31.el8.src",
                "product": {
                  "name": "libtiff-0:4.0.9-31.el8.src",
                  "product_id": "libtiff-0:4.0.9-31.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-31.el8?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-31.el8.aarch64",
                "product": {
                  "name": "libtiff-0:4.0.9-31.el8.aarch64",
                  "product_id": "libtiff-0:4.0.9-31.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-31.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-31.el8.aarch64",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-31.el8.aarch64",
                  "product_id": "libtiff-devel-0:4.0.9-31.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-31.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-31.el8.aarch64",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-31.el8.aarch64",
                  "product_id": "libtiff-debugsource-0:4.0.9-31.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-31.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
                  "product_id": "libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-31.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-31.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.0.9-31.el8.aarch64",
                "product": {
                  "name": "libtiff-tools-0:4.0.9-31.el8.aarch64",
                  "product_id": "libtiff-tools-0:4.0.9-31.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-31.el8?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-31.el8.ppc64le",
                "product": {
                  "name": "libtiff-0:4.0.9-31.el8.ppc64le",
                  "product_id": "libtiff-0:4.0.9-31.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-31.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-31.el8.ppc64le",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-31.el8.ppc64le",
                  "product_id": "libtiff-devel-0:4.0.9-31.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-31.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
                  "product_id": "libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-31.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
                  "product_id": "libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-31.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-31.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.0.9-31.el8.ppc64le",
                "product": {
                  "name": "libtiff-tools-0:4.0.9-31.el8.ppc64le",
                  "product_id": "libtiff-tools-0:4.0.9-31.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-31.el8?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-31.el8.i686",
                "product": {
                  "name": "libtiff-0:4.0.9-31.el8.i686",
                  "product_id": "libtiff-0:4.0.9-31.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-31.el8?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-31.el8.i686",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-31.el8.i686",
                  "product_id": "libtiff-devel-0:4.0.9-31.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-31.el8?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-31.el8.i686",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-31.el8.i686",
                  "product_id": "libtiff-debugsource-0:4.0.9-31.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-31.el8?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-31.el8.i686",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-31.el8.i686",
                  "product_id": "libtiff-debuginfo-0:4.0.9-31.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-31.el8?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-31.el8?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-31.el8.x86_64",
                "product": {
                  "name": "libtiff-0:4.0.9-31.el8.x86_64",
                  "product_id": "libtiff-0:4.0.9-31.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-31.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-31.el8.x86_64",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-31.el8.x86_64",
                  "product_id": "libtiff-devel-0:4.0.9-31.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-31.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-31.el8.x86_64",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-31.el8.x86_64",
                  "product_id": "libtiff-debugsource-0:4.0.9-31.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-31.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
                  "product_id": "libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-31.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-31.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.0.9-31.el8.x86_64",
                "product": {
                  "name": "libtiff-tools-0:4.0.9-31.el8.x86_64",
                  "product_id": "libtiff-tools-0:4.0.9-31.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-31.el8?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-31.el8.s390x",
                "product": {
                  "name": "libtiff-0:4.0.9-31.el8.s390x",
                  "product_id": "libtiff-0:4.0.9-31.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-31.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-31.el8.s390x",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-31.el8.s390x",
                  "product_id": "libtiff-devel-0:4.0.9-31.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-31.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-31.el8.s390x",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-31.el8.s390x",
                  "product_id": "libtiff-debugsource-0:4.0.9-31.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-31.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-31.el8.s390x",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-31.el8.s390x",
                  "product_id": "libtiff-debuginfo-0:4.0.9-31.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-31.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-31.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.0.9-31.el8.s390x",
                "product": {
                  "name": "libtiff-tools-0:4.0.9-31.el8.s390x",
                  "product_id": "libtiff-tools-0:4.0.9-31.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-31.el8?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.src"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.src",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-tools-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.src as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.src"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.src",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-tools-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-4645",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2023-03-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2176220"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in tiffcp, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the tiffcp function in tools/tiffcp.c, resulting in a denial of service and limited information disclosure.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "libtiff is a general purpose library to manipulate TIFF images. The library itself is not used directly, it\u0027s used via another application linked with the library, which means this issue can only be triggered by an application processing untrusted images. Therefore, if there is no way an attacker can provide a crafted image to an application, it\u0027s likely not possible to exploit this CVE.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.aarch64",
          "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.i686",
          "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.ppc64le",
          "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.s390x",
          "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.src",
          "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.x86_64",
          "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
          "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.i686",
          "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
          "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.s390x",
          "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
          "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.aarch64",
          "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.i686",
          "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
          "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.s390x",
          "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.x86_64",
          "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.aarch64",
          "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.i686",
          "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.ppc64le",
          "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.s390x",
          "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.x86_64",
          "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.aarch64",
          "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.ppc64le",
          "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.s390x",
          "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.x86_64",
          "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
          "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
          "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
          "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
          "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64",
          "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.aarch64",
          "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.i686",
          "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.ppc64le",
          "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.s390x",
          "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.src",
          "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.x86_64",
          "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
          "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.i686",
          "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
          "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.s390x",
          "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
          "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.aarch64",
          "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.i686",
          "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
          "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.s390x",
          "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.x86_64",
          "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.aarch64",
          "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.i686",
          "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.ppc64le",
          "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.s390x",
          "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.x86_64",
          "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.aarch64",
          "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.ppc64le",
          "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.s390x",
          "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.x86_64",
          "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
          "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
          "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
          "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
          "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-4645"
        },
        {
          "category": "external",
          "summary": "RHBZ#2176220",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176220"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-4645",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4645",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4645"
        }
      ],
      "release_date": "2023-03-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-22T09:28:57+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.src",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.src",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3059"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.src",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.src",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c"
    }
  ]
}
  RHSA-2024:3059
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for libtiff is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.\n\nSecurity Fix(es):\n\n* libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c (CVE-2022-4645)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.10 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:3059",
        "url": "https://access.redhat.com/errata/RHSA-2024:3059"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index"
      },
      {
        "category": "external",
        "summary": "2176220",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176220"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3059.json"
      }
    ],
    "title": "Red Hat Security Advisory: libtiff security update",
    "tracking": {
      "current_release_date": "2025-09-25T13:10:15+00:00",
      "generator": {
        "date": "2025-09-25T13:10:15+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:3059",
      "initial_release_date": "2024-05-22T09:28:57+00:00",
      "revision_history": [
        {
          "date": "2024-05-22T09:28:57+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-22T09:28:57+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T13:10:15+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.10.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux CRB (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux CRB (v. 8)",
                  "product_id": "CRB-8.10.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-31.el8.src",
                "product": {
                  "name": "libtiff-0:4.0.9-31.el8.src",
                  "product_id": "libtiff-0:4.0.9-31.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-31.el8?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-31.el8.aarch64",
                "product": {
                  "name": "libtiff-0:4.0.9-31.el8.aarch64",
                  "product_id": "libtiff-0:4.0.9-31.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-31.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-31.el8.aarch64",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-31.el8.aarch64",
                  "product_id": "libtiff-devel-0:4.0.9-31.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-31.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-31.el8.aarch64",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-31.el8.aarch64",
                  "product_id": "libtiff-debugsource-0:4.0.9-31.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-31.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
                  "product_id": "libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-31.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-31.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.0.9-31.el8.aarch64",
                "product": {
                  "name": "libtiff-tools-0:4.0.9-31.el8.aarch64",
                  "product_id": "libtiff-tools-0:4.0.9-31.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-31.el8?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-31.el8.ppc64le",
                "product": {
                  "name": "libtiff-0:4.0.9-31.el8.ppc64le",
                  "product_id": "libtiff-0:4.0.9-31.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-31.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-31.el8.ppc64le",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-31.el8.ppc64le",
                  "product_id": "libtiff-devel-0:4.0.9-31.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-31.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
                  "product_id": "libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-31.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
                  "product_id": "libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-31.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-31.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.0.9-31.el8.ppc64le",
                "product": {
                  "name": "libtiff-tools-0:4.0.9-31.el8.ppc64le",
                  "product_id": "libtiff-tools-0:4.0.9-31.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-31.el8?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-31.el8.i686",
                "product": {
                  "name": "libtiff-0:4.0.9-31.el8.i686",
                  "product_id": "libtiff-0:4.0.9-31.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-31.el8?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-31.el8.i686",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-31.el8.i686",
                  "product_id": "libtiff-devel-0:4.0.9-31.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-31.el8?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-31.el8.i686",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-31.el8.i686",
                  "product_id": "libtiff-debugsource-0:4.0.9-31.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-31.el8?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-31.el8.i686",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-31.el8.i686",
                  "product_id": "libtiff-debuginfo-0:4.0.9-31.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-31.el8?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-31.el8?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-31.el8.x86_64",
                "product": {
                  "name": "libtiff-0:4.0.9-31.el8.x86_64",
                  "product_id": "libtiff-0:4.0.9-31.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-31.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-31.el8.x86_64",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-31.el8.x86_64",
                  "product_id": "libtiff-devel-0:4.0.9-31.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-31.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-31.el8.x86_64",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-31.el8.x86_64",
                  "product_id": "libtiff-debugsource-0:4.0.9-31.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-31.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
                  "product_id": "libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-31.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-31.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.0.9-31.el8.x86_64",
                "product": {
                  "name": "libtiff-tools-0:4.0.9-31.el8.x86_64",
                  "product_id": "libtiff-tools-0:4.0.9-31.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-31.el8?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-31.el8.s390x",
                "product": {
                  "name": "libtiff-0:4.0.9-31.el8.s390x",
                  "product_id": "libtiff-0:4.0.9-31.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-31.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-31.el8.s390x",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-31.el8.s390x",
                  "product_id": "libtiff-devel-0:4.0.9-31.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-31.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-31.el8.s390x",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-31.el8.s390x",
                  "product_id": "libtiff-debugsource-0:4.0.9-31.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-31.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-31.el8.s390x",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-31.el8.s390x",
                  "product_id": "libtiff-debuginfo-0:4.0.9-31.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-31.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-31.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.0.9-31.el8.s390x",
                "product": {
                  "name": "libtiff-tools-0:4.0.9-31.el8.s390x",
                  "product_id": "libtiff-tools-0:4.0.9-31.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-31.el8?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.src"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.src",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-tools-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.src as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.src"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.src",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-tools-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-4645",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2023-03-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2176220"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in tiffcp, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the tiffcp function in tools/tiffcp.c, resulting in a denial of service and limited information disclosure.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "libtiff is a general purpose library to manipulate TIFF images. The library itself is not used directly, it\u0027s used via another application linked with the library, which means this issue can only be triggered by an application processing untrusted images. Therefore, if there is no way an attacker can provide a crafted image to an application, it\u0027s likely not possible to exploit this CVE.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.aarch64",
          "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.i686",
          "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.ppc64le",
          "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.s390x",
          "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.src",
          "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.x86_64",
          "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
          "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.i686",
          "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
          "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.s390x",
          "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
          "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.aarch64",
          "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.i686",
          "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
          "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.s390x",
          "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.x86_64",
          "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.aarch64",
          "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.i686",
          "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.ppc64le",
          "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.s390x",
          "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.x86_64",
          "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.aarch64",
          "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.ppc64le",
          "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.s390x",
          "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.x86_64",
          "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
          "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
          "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
          "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
          "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64",
          "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.aarch64",
          "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.i686",
          "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.ppc64le",
          "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.s390x",
          "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.src",
          "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.x86_64",
          "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
          "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.i686",
          "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
          "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.s390x",
          "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
          "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.aarch64",
          "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.i686",
          "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
          "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.s390x",
          "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.x86_64",
          "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.aarch64",
          "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.i686",
          "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.ppc64le",
          "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.s390x",
          "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.x86_64",
          "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.aarch64",
          "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.ppc64le",
          "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.s390x",
          "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.x86_64",
          "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
          "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
          "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
          "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
          "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-4645"
        },
        {
          "category": "external",
          "summary": "RHBZ#2176220",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176220"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-4645",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4645",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4645"
        }
      ],
      "release_date": "2023-03-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-22T09:28:57+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.src",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.src",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3059"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.src",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.src",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c"
    }
  ]
}
  RHSA-2023:2340
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for libtiff is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.\n\nSecurity Fix(es):\n\n* libtiff: heap Buffer overflows in tiffcrop.c (CVE-2022-3570)\n\n* libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix (CVE-2022-3597)\n\n* libtiff: out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c (CVE-2022-3598)\n\n* libtiff: out-of-bounds read in writeSingleSection in tools/tiffcrop.c (CVE-2022-3599)\n\n* libtiff: out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c (CVE-2022-3626)\n\n* libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c (CVE-2022-3627)\n\n* libtiff: integer overflow in function TIFFReadRGBATileExt of the file (CVE-2022-3970)\n\n* libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c (CVE-2022-4645)\n\n* libtiff: heap buffer overflow issues related to TIFFTAG_INKNAMES and related TIFFTAG_NUMBEROFINKS value (CVE-2023-30774)\n\n* libtiff: Heap buffer overflow in extractContigSamples32bits, tiffcrop.c (CVE-2023-30775)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.2 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2023:2340",
        "url": "https://access.redhat.com/errata/RHSA-2023:2340"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index"
      },
      {
        "category": "external",
        "summary": "2142734",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142734"
      },
      {
        "category": "external",
        "summary": "2142736",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142736"
      },
      {
        "category": "external",
        "summary": "2142738",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142738"
      },
      {
        "category": "external",
        "summary": "2142740",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142740"
      },
      {
        "category": "external",
        "summary": "2142741",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142741"
      },
      {
        "category": "external",
        "summary": "2142742",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142742"
      },
      {
        "category": "external",
        "summary": "2148918",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148918"
      },
      {
        "category": "external",
        "summary": "2176220",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176220"
      },
      {
        "category": "external",
        "summary": "2187139",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187139"
      },
      {
        "category": "external",
        "summary": "2187141",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187141"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2340.json"
      }
    ],
    "title": "Red Hat Security Advisory: libtiff security update",
    "tracking": {
      "current_release_date": "2025-10-09T23:11:09+00:00",
      "generator": {
        "date": "2025-10-09T23:11:09+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2023:2340",
      "initial_release_date": "2023-05-09T10:02:52+00:00",
      "revision_history": [
        {
          "date": "2023-05-09T10:02:52+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2023-05-09T10:02:52+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T23:11:09+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.2.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux CRB (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux CRB (v. 9)",
                  "product_id": "CRB-9.2.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-7.el9.src",
                "product": {
                  "name": "libtiff-0:4.4.0-7.el9.src",
                  "product_id": "libtiff-0:4.4.0-7.el9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-7.el9.aarch64",
                "product": {
                  "name": "libtiff-0:4.4.0-7.el9.aarch64",
                  "product_id": "libtiff-0:4.4.0-7.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-7.el9.aarch64",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-7.el9.aarch64",
                  "product_id": "libtiff-devel-0:4.4.0-7.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-7.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-7.el9.aarch64",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-7.el9.aarch64",
                  "product_id": "libtiff-debugsource-0:4.4.0-7.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-7.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
                  "product_id": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-7.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-7.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-7.el9.aarch64",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-7.el9.aarch64",
                  "product_id": "libtiff-tools-0:4.4.0-7.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-7.el9?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-7.el9.ppc64le",
                "product": {
                  "name": "libtiff-0:4.4.0-7.el9.ppc64le",
                  "product_id": "libtiff-0:4.4.0-7.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-7.el9.ppc64le",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-7.el9.ppc64le",
                  "product_id": "libtiff-devel-0:4.4.0-7.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-7.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
                  "product_id": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-7.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
                  "product_id": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-7.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-7.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-7.el9.ppc64le",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-7.el9.ppc64le",
                  "product_id": "libtiff-tools-0:4.4.0-7.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-7.el9?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-7.el9.i686",
                "product": {
                  "name": "libtiff-0:4.4.0-7.el9.i686",
                  "product_id": "libtiff-0:4.4.0-7.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-7.el9.i686",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-7.el9.i686",
                  "product_id": "libtiff-devel-0:4.4.0-7.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-7.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-7.el9.i686",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-7.el9.i686",
                  "product_id": "libtiff-debugsource-0:4.4.0-7.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-7.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-7.el9.i686",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-7.el9.i686",
                  "product_id": "libtiff-debuginfo-0:4.4.0-7.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-7.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-7.el9?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-7.el9.x86_64",
                "product": {
                  "name": "libtiff-0:4.4.0-7.el9.x86_64",
                  "product_id": "libtiff-0:4.4.0-7.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-7.el9.x86_64",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-7.el9.x86_64",
                  "product_id": "libtiff-devel-0:4.4.0-7.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-7.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-7.el9.x86_64",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-7.el9.x86_64",
                  "product_id": "libtiff-debugsource-0:4.4.0-7.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-7.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
                  "product_id": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-7.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-7.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-7.el9.x86_64",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-7.el9.x86_64",
                  "product_id": "libtiff-tools-0:4.4.0-7.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-7.el9?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-7.el9.s390x",
                "product": {
                  "name": "libtiff-0:4.4.0-7.el9.s390x",
                  "product_id": "libtiff-0:4.4.0-7.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-7.el9.s390x",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-7.el9.s390x",
                  "product_id": "libtiff-devel-0:4.4.0-7.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-7.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-7.el9.s390x",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-7.el9.s390x",
                  "product_id": "libtiff-debugsource-0:4.4.0-7.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-7.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-7.el9.s390x",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-7.el9.s390x",
                  "product_id": "libtiff-debuginfo-0:4.4.0-7.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-7.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-7.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-7.el9.s390x",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-7.el9.s390x",
                  "product_id": "libtiff-tools-0:4.4.0-7.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-7.el9?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.src",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-tools-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.src as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.src",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-tools-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-3570",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "discovery_date": "2022-10-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2142734"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer overflow flaw was found in Libtiff\u0027s tiffcrop utility. This issue occurs during the conversion of a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes an out-of-bound access resulting an application crash, eventually leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: heap Buffer overflows in tiffcrop.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-122: Heap-based Buffer Overflow vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with least privilege principles to ensure that only authorized roles and users can execute or manipulate code. Red Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by heap-based buffer overflow exploitations. The environment leverages malicious code protections such as IPS/IDS and antimalware solutions that detect and respond to indicators in real time, preventing or limiting the impact of exploitation attempts. Static code analysis and peer code review techniques ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) enhance resilience against memory buffer overflows and denial-of-service attacks.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3570"
        },
        {
          "category": "external",
          "summary": "RHBZ#2142734",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142734"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3570",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3570",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3570"
        }
      ],
      "release_date": "2022-02-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: heap Buffer overflows in tiffcrop.c"
    },
    {
      "cve": "CVE-2022-3597",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-10-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2142736"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the _TIFFmemcpy function in libtiff/tif_unix.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3597"
        },
        {
          "category": "external",
          "summary": "RHBZ#2142736",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142736"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3597",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3597",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3597"
        }
      ],
      "release_date": "2022-03-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix"
    },
    {
      "cve": "CVE-2022-3598",
      "discovery_date": "2022-10-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2142738"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the extractContigSamplesShifted24bits function in tools/tiffcrop.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3598"
        },
        {
          "category": "external",
          "summary": "RHBZ#2142738",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142738"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3598",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3598",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3598"
        }
      ],
      "release_date": "2022-06-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c"
    },
    {
      "cve": "CVE-2022-3599",
      "discovery_date": "2022-10-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2142740"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds read flaw was found in the writeSingleSection function in tools/tiffcrop.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds read in writeSingleSection in tools/tiffcrop.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3599"
        },
        {
          "category": "external",
          "summary": "RHBZ#2142740",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142740"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3599",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3599",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3599"
        }
      ],
      "release_date": "2022-02-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds read in writeSingleSection in tools/tiffcrop.c"
    },
    {
      "cve": "CVE-2022-3626",
      "discovery_date": "2022-10-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2142741"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the _TIFFmemset function in libtiff/tif_unix.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3626"
        },
        {
          "category": "external",
          "summary": "RHBZ#2142741",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142741"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3626",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3626",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3626"
        }
      ],
      "release_date": "2022-05-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c"
    },
    {
      "cve": "CVE-2022-3627",
      "discovery_date": "2022-10-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2142742"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the _TIFFmemcpy function in libtiff/tif_unix.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3627"
        },
        {
          "category": "external",
          "summary": "RHBZ#2142742",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142742"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3627",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3627",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3627"
        }
      ],
      "release_date": "2022-03-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c"
    },
    {
      "cve": "CVE-2022-3970",
      "cwe": {
        "id": "CWE-680",
        "name": "Integer Overflow to Buffer Overflow"
      },
      "discovery_date": "2022-11-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2148918"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An integer overflow flaw was found in LibTIFF. This issue exists in the TIFFReadRGBATileExt function of the libtiff/tif_getimage.c file, and may lead to a buffer overflow.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: integer overflow in function TIFFReadRGBATileExt of the file",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product security rated this issue having Moderate security impact as the exploitation of this issue will most likely to cause a denial of service attack. The score is based on the worst case scenario that an attacker might use the integer overflow to trigger other vulnerabilities such as buffer overflow, that could result in more adverse effects.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3970"
        },
        {
          "category": "external",
          "summary": "RHBZ#2148918",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148918"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3970",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3970"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3970",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3970"
        }
      ],
      "release_date": "2022-11-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: integer overflow in function TIFFReadRGBATileExt of the file"
    },
    {
      "cve": "CVE-2022-4645",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2023-03-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2176220"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in tiffcp, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the tiffcp function in tools/tiffcp.c, resulting in a denial of service and limited information disclosure.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "libtiff is a general purpose library to manipulate TIFF images. The library itself is not used directly, it\u0027s used via another application linked with the library, which means this issue can only be triggered by an application processing untrusted images. Therefore, if there is no way an attacker can provide a crafted image to an application, it\u0027s likely not possible to exploit this CVE.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-4645"
        },
        {
          "category": "external",
          "summary": "RHBZ#2176220",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176220"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-4645",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4645",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4645"
        }
      ],
      "release_date": "2023-03-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c"
    },
    {
      "cve": "CVE-2023-30086",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2023-05-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2203650"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the libtiff library. This flaw causes a buffer overflow in libtiff that allows a local attacker to cause a denial of service via the tiffcp function in tiffcp.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Heap buffer overflow in tiffcp() at tiffcp.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nSecure baseline configurations provide a strong foundation for maintaining a secure and resilient environment. Rigorous testing and development practices (SAST, DAST, etc.) identify and address memory vulnerabilities before they are promoted to Red Hat production platforms, and the malicious code protection used further mitigates impacts by detecting, blocking, and responding to exploitation attempts. The platform uses OS versions that inherit certain security tools and features from RHEL that are enabled by default, such as SELinux and Address Space Layout Randomization (ASLR). Least functionality and process isolation minimizes the attack surface by disabling unauthorized services and ports and containing any corruption within the originating process, preventing it from affecting other processes or the system as a whole.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-30086"
        },
        {
          "category": "external",
          "summary": "RHBZ#2203650",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2203650"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-30086",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-30086",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30086"
        }
      ],
      "release_date": "2023-05-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Heap buffer overflow in tiffcp() at tiffcp.c"
    },
    {
      "cve": "CVE-2023-30774",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2023-04-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2187139"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the libtiff library. This flaw causes a heap buffer overflow issue via the TIFFTAG_INKNAMES and TIFFTAG_NUMBEROFINKS values.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: heap buffer overflow issues related to TIFFTAG_INKNAMES and related TIFFTAG_NUMBEROFINKS value",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer to CWE-787: Out-of-bounds Write vulnerability, and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nBoundary protection, access enforcement, and least privilege controls limit access to the platform and memory, ensuring only authorized users and processes can interact with sensitive components. This reduces the risk of attackers exploiting memory vulnerabilities. Configuration management controls like baseline configuration and least functionality can help prevent vulnerability exploitation by enforcing secure system configurations, enabling memory protection, and removing unnecessary services, ports, or functions that could be exploited. Memory protection controls mitigate the risk of potential memory corruption by enforcing runtime protections. Finally, process isolation and encryption of data at rest reduce the potential impacts in the case of successful exploitation by isolating compromised processes and ensuring sensitive data remains secure even in the event of memory corruption.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-30774"
        },
        {
          "category": "external",
          "summary": "RHBZ#2187139",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187139"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-30774",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-30774",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30774"
        }
      ],
      "release_date": "2023-04-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: heap buffer overflow issues related to TIFFTAG_INKNAMES and related TIFFTAG_NUMBEROFINKS value"
    },
    {
      "cve": "CVE-2023-30775",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2023-04-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2187141"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the libtiff library. This security flaw causes a heap buffer overflow in extractContigSamples32bits, tiffcrop.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Heap buffer overflow in extractContigSamples32bits, tiffcrop.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer to CWE-787: Out-of-bounds Write vulnerability, and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nBoundary protection, access enforcement, and least privilege controls limit access to the platform and memory, ensuring only authorized users and processes can interact with sensitive components. This reduces the risk of attackers exploiting memory vulnerabilities. Configuration management controls like baseline configuration and least functionality can help prevent vulnerability exploitation by enforcing secure system configurations, enabling memory protection, and removing unnecessary services, ports, or functions that could be exploited. Memory protection controls mitigate the risk of potential memory corruption by enforcing runtime protections. Finally, process isolation and encryption of data at rest reduce the potential impacts in the case of successful exploitation by isolating compromised processes and ensuring sensitive data remains secure even in the event of memory corruption.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-30775"
        },
        {
          "category": "external",
          "summary": "RHBZ#2187141",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187141"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-30775",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-30775"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-30775",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30775"
        }
      ],
      "release_date": "2023-04-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Heap buffer overflow in extractContigSamples32bits, tiffcrop.c"
    }
  ]
}
  rhsa-2023_2340
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for libtiff is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.\n\nSecurity Fix(es):\n\n* libtiff: heap Buffer overflows in tiffcrop.c (CVE-2022-3570)\n\n* libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix (CVE-2022-3597)\n\n* libtiff: out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c (CVE-2022-3598)\n\n* libtiff: out-of-bounds read in writeSingleSection in tools/tiffcrop.c (CVE-2022-3599)\n\n* libtiff: out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c (CVE-2022-3626)\n\n* libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c (CVE-2022-3627)\n\n* libtiff: integer overflow in function TIFFReadRGBATileExt of the file (CVE-2022-3970)\n\n* libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c (CVE-2022-4645)\n\n* libtiff: heap buffer overflow issues related to TIFFTAG_INKNAMES and related TIFFTAG_NUMBEROFINKS value (CVE-2023-30774)\n\n* libtiff: Heap buffer overflow in extractContigSamples32bits, tiffcrop.c (CVE-2023-30775)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.2 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2023:2340",
        "url": "https://access.redhat.com/errata/RHSA-2023:2340"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index"
      },
      {
        "category": "external",
        "summary": "2142734",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142734"
      },
      {
        "category": "external",
        "summary": "2142736",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142736"
      },
      {
        "category": "external",
        "summary": "2142738",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142738"
      },
      {
        "category": "external",
        "summary": "2142740",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142740"
      },
      {
        "category": "external",
        "summary": "2142741",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142741"
      },
      {
        "category": "external",
        "summary": "2142742",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142742"
      },
      {
        "category": "external",
        "summary": "2148918",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148918"
      },
      {
        "category": "external",
        "summary": "2176220",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176220"
      },
      {
        "category": "external",
        "summary": "2187139",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187139"
      },
      {
        "category": "external",
        "summary": "2187141",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187141"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2340.json"
      }
    ],
    "title": "Red Hat Security Advisory: libtiff security update",
    "tracking": {
      "current_release_date": "2024-11-22T21:20:57+00:00",
      "generator": {
        "date": "2024-11-22T21:20:57+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2023:2340",
      "initial_release_date": "2023-05-09T10:02:52+00:00",
      "revision_history": [
        {
          "date": "2023-05-09T10:02:52+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2023-05-09T10:02:52+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T21:20:57+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.2.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux CRB (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux CRB (v. 9)",
                  "product_id": "CRB-9.2.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-7.el9.src",
                "product": {
                  "name": "libtiff-0:4.4.0-7.el9.src",
                  "product_id": "libtiff-0:4.4.0-7.el9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-7.el9.aarch64",
                "product": {
                  "name": "libtiff-0:4.4.0-7.el9.aarch64",
                  "product_id": "libtiff-0:4.4.0-7.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-7.el9.aarch64",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-7.el9.aarch64",
                  "product_id": "libtiff-devel-0:4.4.0-7.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-7.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-7.el9.aarch64",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-7.el9.aarch64",
                  "product_id": "libtiff-debugsource-0:4.4.0-7.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-7.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
                  "product_id": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-7.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-7.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-7.el9.aarch64",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-7.el9.aarch64",
                  "product_id": "libtiff-tools-0:4.4.0-7.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-7.el9?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-7.el9.ppc64le",
                "product": {
                  "name": "libtiff-0:4.4.0-7.el9.ppc64le",
                  "product_id": "libtiff-0:4.4.0-7.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-7.el9.ppc64le",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-7.el9.ppc64le",
                  "product_id": "libtiff-devel-0:4.4.0-7.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-7.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
                  "product_id": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-7.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
                  "product_id": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-7.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-7.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-7.el9.ppc64le",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-7.el9.ppc64le",
                  "product_id": "libtiff-tools-0:4.4.0-7.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-7.el9?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-7.el9.i686",
                "product": {
                  "name": "libtiff-0:4.4.0-7.el9.i686",
                  "product_id": "libtiff-0:4.4.0-7.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-7.el9.i686",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-7.el9.i686",
                  "product_id": "libtiff-devel-0:4.4.0-7.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-7.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-7.el9.i686",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-7.el9.i686",
                  "product_id": "libtiff-debugsource-0:4.4.0-7.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-7.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-7.el9.i686",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-7.el9.i686",
                  "product_id": "libtiff-debuginfo-0:4.4.0-7.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-7.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-7.el9?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-7.el9.x86_64",
                "product": {
                  "name": "libtiff-0:4.4.0-7.el9.x86_64",
                  "product_id": "libtiff-0:4.4.0-7.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-7.el9.x86_64",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-7.el9.x86_64",
                  "product_id": "libtiff-devel-0:4.4.0-7.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-7.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-7.el9.x86_64",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-7.el9.x86_64",
                  "product_id": "libtiff-debugsource-0:4.4.0-7.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-7.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
                  "product_id": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-7.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-7.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-7.el9.x86_64",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-7.el9.x86_64",
                  "product_id": "libtiff-tools-0:4.4.0-7.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-7.el9?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-7.el9.s390x",
                "product": {
                  "name": "libtiff-0:4.4.0-7.el9.s390x",
                  "product_id": "libtiff-0:4.4.0-7.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-7.el9.s390x",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-7.el9.s390x",
                  "product_id": "libtiff-devel-0:4.4.0-7.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-7.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-7.el9.s390x",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-7.el9.s390x",
                  "product_id": "libtiff-debugsource-0:4.4.0-7.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-7.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-7.el9.s390x",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-7.el9.s390x",
                  "product_id": "libtiff-debuginfo-0:4.4.0-7.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-7.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-7.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-7.el9.s390x",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-7.el9.s390x",
                  "product_id": "libtiff-tools-0:4.4.0-7.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-7.el9?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.src",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-tools-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.src as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.src",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-tools-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-3570",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "discovery_date": "2022-10-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2142734"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer overflow flaw was found in Libtiff\u0027s tiffcrop utility. This issue occurs during the conversion of a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes an out-of-bound access resulting an application crash, eventually leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: heap Buffer overflows in tiffcrop.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3570"
        },
        {
          "category": "external",
          "summary": "RHBZ#2142734",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142734"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3570",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3570",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3570"
        }
      ],
      "release_date": "2022-02-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: heap Buffer overflows in tiffcrop.c"
    },
    {
      "cve": "CVE-2022-3597",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-10-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2142736"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the _TIFFmemcpy function in libtiff/tif_unix.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3597"
        },
        {
          "category": "external",
          "summary": "RHBZ#2142736",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142736"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3597",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3597",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3597"
        }
      ],
      "release_date": "2022-03-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix"
    },
    {
      "cve": "CVE-2022-3598",
      "discovery_date": "2022-10-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2142738"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the extractContigSamplesShifted24bits function in tools/tiffcrop.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3598"
        },
        {
          "category": "external",
          "summary": "RHBZ#2142738",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142738"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3598",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3598",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3598"
        }
      ],
      "release_date": "2022-06-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c"
    },
    {
      "cve": "CVE-2022-3599",
      "discovery_date": "2022-10-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2142740"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds read flaw was found in the writeSingleSection function in tools/tiffcrop.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds read in writeSingleSection in tools/tiffcrop.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3599"
        },
        {
          "category": "external",
          "summary": "RHBZ#2142740",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142740"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3599",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3599",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3599"
        }
      ],
      "release_date": "2022-02-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds read in writeSingleSection in tools/tiffcrop.c"
    },
    {
      "cve": "CVE-2022-3626",
      "discovery_date": "2022-10-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2142741"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the _TIFFmemset function in libtiff/tif_unix.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3626"
        },
        {
          "category": "external",
          "summary": "RHBZ#2142741",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142741"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3626",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3626",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3626"
        }
      ],
      "release_date": "2022-05-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c"
    },
    {
      "cve": "CVE-2022-3627",
      "discovery_date": "2022-10-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2142742"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the _TIFFmemcpy function in libtiff/tif_unix.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3627"
        },
        {
          "category": "external",
          "summary": "RHBZ#2142742",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142742"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3627",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3627",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3627"
        }
      ],
      "release_date": "2022-03-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c"
    },
    {
      "cve": "CVE-2022-3970",
      "cwe": {
        "id": "CWE-680",
        "name": "Integer Overflow to Buffer Overflow"
      },
      "discovery_date": "2022-11-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2148918"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An integer overflow flaw was found in LibTIFF. This issue exists in the TIFFReadRGBATileExt function of the libtiff/tif_getimage.c file, and may lead to a buffer overflow.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: integer overflow in function TIFFReadRGBATileExt of the file",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product security rated this issue having Moderate security impact as the exploitation of this issue will most likely to cause a denial of service attack. The score is based on the worst case scenario that an attacker might use the integer overflow to trigger other vulnerabilities such as buffer overflow, that could result in more adverse effects.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3970"
        },
        {
          "category": "external",
          "summary": "RHBZ#2148918",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148918"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3970",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3970"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3970",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3970"
        }
      ],
      "release_date": "2022-11-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: integer overflow in function TIFFReadRGBATileExt of the file"
    },
    {
      "cve": "CVE-2022-4645",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2023-03-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2176220"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in tiffcp, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the tiffcp function in tools/tiffcp.c, resulting in a denial of service and limited information disclosure.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "libtiff is a general purpose library to manipulate TIFF images. The library itself is not used directly, it\u0027s used via another application linked with the library, which means this issue can only be triggered by an application processing untrusted images. Therefore, if there is no way an attacker can provide a crafted image to an application, it\u0027s likely not possible to exploit this CVE.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-4645"
        },
        {
          "category": "external",
          "summary": "RHBZ#2176220",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176220"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-4645",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4645",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4645"
        }
      ],
      "release_date": "2023-03-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c"
    },
    {
      "cve": "CVE-2023-30086",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2023-05-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2203650"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the libtiff library. This flaw causes a buffer overflow in libtiff that allows a local attacker to cause a denial of service via the tiffcp function in tiffcp.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Heap buffer overflow in tiffcp() at tiffcp.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-30086"
        },
        {
          "category": "external",
          "summary": "RHBZ#2203650",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2203650"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-30086",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-30086",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30086"
        }
      ],
      "release_date": "2023-05-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Heap buffer overflow in tiffcp() at tiffcp.c"
    },
    {
      "cve": "CVE-2023-30774",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2023-04-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2187139"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the libtiff library. This flaw causes a heap buffer overflow issue via the TIFFTAG_INKNAMES and TIFFTAG_NUMBEROFINKS values.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: heap buffer overflow issues related to TIFFTAG_INKNAMES and related TIFFTAG_NUMBEROFINKS value",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-30774"
        },
        {
          "category": "external",
          "summary": "RHBZ#2187139",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187139"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-30774",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-30774",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30774"
        }
      ],
      "release_date": "2023-04-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: heap buffer overflow issues related to TIFFTAG_INKNAMES and related TIFFTAG_NUMBEROFINKS value"
    },
    {
      "cve": "CVE-2023-30775",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2023-04-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2187141"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the libtiff library. This security flaw causes a heap buffer overflow in extractContigSamples32bits, tiffcrop.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Heap buffer overflow in extractContigSamples32bits, tiffcrop.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-30775"
        },
        {
          "category": "external",
          "summary": "RHBZ#2187141",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187141"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-30775",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-30775"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-30775",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30775"
        }
      ],
      "release_date": "2023-04-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Heap buffer overflow in extractContigSamples32bits, tiffcrop.c"
    }
  ]
}
  rhsa-2023:2340
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for libtiff is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.\n\nSecurity Fix(es):\n\n* libtiff: heap Buffer overflows in tiffcrop.c (CVE-2022-3570)\n\n* libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix (CVE-2022-3597)\n\n* libtiff: out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c (CVE-2022-3598)\n\n* libtiff: out-of-bounds read in writeSingleSection in tools/tiffcrop.c (CVE-2022-3599)\n\n* libtiff: out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c (CVE-2022-3626)\n\n* libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c (CVE-2022-3627)\n\n* libtiff: integer overflow in function TIFFReadRGBATileExt of the file (CVE-2022-3970)\n\n* libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c (CVE-2022-4645)\n\n* libtiff: heap buffer overflow issues related to TIFFTAG_INKNAMES and related TIFFTAG_NUMBEROFINKS value (CVE-2023-30774)\n\n* libtiff: Heap buffer overflow in extractContigSamples32bits, tiffcrop.c (CVE-2023-30775)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.2 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2023:2340",
        "url": "https://access.redhat.com/errata/RHSA-2023:2340"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index"
      },
      {
        "category": "external",
        "summary": "2142734",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142734"
      },
      {
        "category": "external",
        "summary": "2142736",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142736"
      },
      {
        "category": "external",
        "summary": "2142738",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142738"
      },
      {
        "category": "external",
        "summary": "2142740",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142740"
      },
      {
        "category": "external",
        "summary": "2142741",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142741"
      },
      {
        "category": "external",
        "summary": "2142742",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142742"
      },
      {
        "category": "external",
        "summary": "2148918",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148918"
      },
      {
        "category": "external",
        "summary": "2176220",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176220"
      },
      {
        "category": "external",
        "summary": "2187139",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187139"
      },
      {
        "category": "external",
        "summary": "2187141",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187141"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2340.json"
      }
    ],
    "title": "Red Hat Security Advisory: libtiff security update",
    "tracking": {
      "current_release_date": "2025-10-09T23:11:09+00:00",
      "generator": {
        "date": "2025-10-09T23:11:09+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2023:2340",
      "initial_release_date": "2023-05-09T10:02:52+00:00",
      "revision_history": [
        {
          "date": "2023-05-09T10:02:52+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2023-05-09T10:02:52+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T23:11:09+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.2.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux CRB (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux CRB (v. 9)",
                  "product_id": "CRB-9.2.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-7.el9.src",
                "product": {
                  "name": "libtiff-0:4.4.0-7.el9.src",
                  "product_id": "libtiff-0:4.4.0-7.el9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-7.el9.aarch64",
                "product": {
                  "name": "libtiff-0:4.4.0-7.el9.aarch64",
                  "product_id": "libtiff-0:4.4.0-7.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-7.el9.aarch64",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-7.el9.aarch64",
                  "product_id": "libtiff-devel-0:4.4.0-7.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-7.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-7.el9.aarch64",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-7.el9.aarch64",
                  "product_id": "libtiff-debugsource-0:4.4.0-7.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-7.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
                  "product_id": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-7.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-7.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-7.el9.aarch64",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-7.el9.aarch64",
                  "product_id": "libtiff-tools-0:4.4.0-7.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-7.el9?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-7.el9.ppc64le",
                "product": {
                  "name": "libtiff-0:4.4.0-7.el9.ppc64le",
                  "product_id": "libtiff-0:4.4.0-7.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-7.el9.ppc64le",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-7.el9.ppc64le",
                  "product_id": "libtiff-devel-0:4.4.0-7.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-7.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
                  "product_id": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-7.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
                  "product_id": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-7.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-7.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-7.el9.ppc64le",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-7.el9.ppc64le",
                  "product_id": "libtiff-tools-0:4.4.0-7.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-7.el9?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-7.el9.i686",
                "product": {
                  "name": "libtiff-0:4.4.0-7.el9.i686",
                  "product_id": "libtiff-0:4.4.0-7.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-7.el9.i686",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-7.el9.i686",
                  "product_id": "libtiff-devel-0:4.4.0-7.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-7.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-7.el9.i686",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-7.el9.i686",
                  "product_id": "libtiff-debugsource-0:4.4.0-7.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-7.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-7.el9.i686",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-7.el9.i686",
                  "product_id": "libtiff-debuginfo-0:4.4.0-7.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-7.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-7.el9?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-7.el9.x86_64",
                "product": {
                  "name": "libtiff-0:4.4.0-7.el9.x86_64",
                  "product_id": "libtiff-0:4.4.0-7.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-7.el9.x86_64",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-7.el9.x86_64",
                  "product_id": "libtiff-devel-0:4.4.0-7.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-7.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-7.el9.x86_64",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-7.el9.x86_64",
                  "product_id": "libtiff-debugsource-0:4.4.0-7.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-7.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
                  "product_id": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-7.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-7.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-7.el9.x86_64",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-7.el9.x86_64",
                  "product_id": "libtiff-tools-0:4.4.0-7.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-7.el9?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.4.0-7.el9.s390x",
                "product": {
                  "name": "libtiff-0:4.4.0-7.el9.s390x",
                  "product_id": "libtiff-0:4.4.0-7.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.4.0-7.el9.s390x",
                "product": {
                  "name": "libtiff-devel-0:4.4.0-7.el9.s390x",
                  "product_id": "libtiff-devel-0:4.4.0-7.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-7.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.4.0-7.el9.s390x",
                "product": {
                  "name": "libtiff-debugsource-0:4.4.0-7.el9.s390x",
                  "product_id": "libtiff-debugsource-0:4.4.0-7.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-7.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.4.0-7.el9.s390x",
                "product": {
                  "name": "libtiff-debuginfo-0:4.4.0-7.el9.s390x",
                  "product_id": "libtiff-debuginfo-0:4.4.0-7.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-7.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
                  "product_id": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-7.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.4.0-7.el9.s390x",
                "product": {
                  "name": "libtiff-tools-0:4.4.0-7.el9.s390x",
                  "product_id": "libtiff-tools-0:4.4.0-7.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-7.el9?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.src",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-tools-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.src as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.src",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-tools-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
          "product_id": "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
        "relates_to_product_reference": "CRB-9.2.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-3570",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "discovery_date": "2022-10-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2142734"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer overflow flaw was found in Libtiff\u0027s tiffcrop utility. This issue occurs during the conversion of a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes an out-of-bound access resulting an application crash, eventually leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: heap Buffer overflows in tiffcrop.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-122: Heap-based Buffer Overflow vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with least privilege principles to ensure that only authorized roles and users can execute or manipulate code. Red Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by heap-based buffer overflow exploitations. The environment leverages malicious code protections such as IPS/IDS and antimalware solutions that detect and respond to indicators in real time, preventing or limiting the impact of exploitation attempts. Static code analysis and peer code review techniques ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) enhance resilience against memory buffer overflows and denial-of-service attacks.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3570"
        },
        {
          "category": "external",
          "summary": "RHBZ#2142734",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142734"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3570",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3570",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3570"
        }
      ],
      "release_date": "2022-02-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: heap Buffer overflows in tiffcrop.c"
    },
    {
      "cve": "CVE-2022-3597",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-10-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2142736"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the _TIFFmemcpy function in libtiff/tif_unix.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3597"
        },
        {
          "category": "external",
          "summary": "RHBZ#2142736",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142736"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3597",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3597",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3597"
        }
      ],
      "release_date": "2022-03-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix"
    },
    {
      "cve": "CVE-2022-3598",
      "discovery_date": "2022-10-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2142738"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the extractContigSamplesShifted24bits function in tools/tiffcrop.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3598"
        },
        {
          "category": "external",
          "summary": "RHBZ#2142738",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142738"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3598",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3598",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3598"
        }
      ],
      "release_date": "2022-06-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c"
    },
    {
      "cve": "CVE-2022-3599",
      "discovery_date": "2022-10-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2142740"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds read flaw was found in the writeSingleSection function in tools/tiffcrop.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds read in writeSingleSection in tools/tiffcrop.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3599"
        },
        {
          "category": "external",
          "summary": "RHBZ#2142740",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142740"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3599",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3599",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3599"
        }
      ],
      "release_date": "2022-02-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds read in writeSingleSection in tools/tiffcrop.c"
    },
    {
      "cve": "CVE-2022-3626",
      "discovery_date": "2022-10-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2142741"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the _TIFFmemset function in libtiff/tif_unix.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3626"
        },
        {
          "category": "external",
          "summary": "RHBZ#2142741",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142741"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3626",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3626",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3626"
        }
      ],
      "release_date": "2022-05-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c"
    },
    {
      "cve": "CVE-2022-3627",
      "discovery_date": "2022-10-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2142742"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the _TIFFmemcpy function in libtiff/tif_unix.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3627"
        },
        {
          "category": "external",
          "summary": "RHBZ#2142742",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142742"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3627",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3627",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3627"
        }
      ],
      "release_date": "2022-03-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c"
    },
    {
      "cve": "CVE-2022-3970",
      "cwe": {
        "id": "CWE-680",
        "name": "Integer Overflow to Buffer Overflow"
      },
      "discovery_date": "2022-11-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2148918"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An integer overflow flaw was found in LibTIFF. This issue exists in the TIFFReadRGBATileExt function of the libtiff/tif_getimage.c file, and may lead to a buffer overflow.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: integer overflow in function TIFFReadRGBATileExt of the file",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product security rated this issue having Moderate security impact as the exploitation of this issue will most likely to cause a denial of service attack. The score is based on the worst case scenario that an attacker might use the integer overflow to trigger other vulnerabilities such as buffer overflow, that could result in more adverse effects.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3970"
        },
        {
          "category": "external",
          "summary": "RHBZ#2148918",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148918"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3970",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3970"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3970",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3970"
        }
      ],
      "release_date": "2022-11-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: integer overflow in function TIFFReadRGBATileExt of the file"
    },
    {
      "cve": "CVE-2022-4645",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2023-03-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2176220"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in tiffcp, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the tiffcp function in tools/tiffcp.c, resulting in a denial of service and limited information disclosure.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "libtiff is a general purpose library to manipulate TIFF images. The library itself is not used directly, it\u0027s used via another application linked with the library, which means this issue can only be triggered by an application processing untrusted images. Therefore, if there is no way an attacker can provide a crafted image to an application, it\u0027s likely not possible to exploit this CVE.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-4645"
        },
        {
          "category": "external",
          "summary": "RHBZ#2176220",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176220"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-4645",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4645",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4645"
        }
      ],
      "release_date": "2023-03-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c"
    },
    {
      "cve": "CVE-2023-30086",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2023-05-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2203650"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the libtiff library. This flaw causes a buffer overflow in libtiff that allows a local attacker to cause a denial of service via the tiffcp function in tiffcp.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Heap buffer overflow in tiffcp() at tiffcp.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nSecure baseline configurations provide a strong foundation for maintaining a secure and resilient environment. Rigorous testing and development practices (SAST, DAST, etc.) identify and address memory vulnerabilities before they are promoted to Red Hat production platforms, and the malicious code protection used further mitigates impacts by detecting, blocking, and responding to exploitation attempts. The platform uses OS versions that inherit certain security tools and features from RHEL that are enabled by default, such as SELinux and Address Space Layout Randomization (ASLR). Least functionality and process isolation minimizes the attack surface by disabling unauthorized services and ports and containing any corruption within the originating process, preventing it from affecting other processes or the system as a whole.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-30086"
        },
        {
          "category": "external",
          "summary": "RHBZ#2203650",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2203650"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-30086",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-30086",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30086"
        }
      ],
      "release_date": "2023-05-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Heap buffer overflow in tiffcp() at tiffcp.c"
    },
    {
      "cve": "CVE-2023-30774",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2023-04-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2187139"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the libtiff library. This flaw causes a heap buffer overflow issue via the TIFFTAG_INKNAMES and TIFFTAG_NUMBEROFINKS values.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: heap buffer overflow issues related to TIFFTAG_INKNAMES and related TIFFTAG_NUMBEROFINKS value",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer to CWE-787: Out-of-bounds Write vulnerability, and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nBoundary protection, access enforcement, and least privilege controls limit access to the platform and memory, ensuring only authorized users and processes can interact with sensitive components. This reduces the risk of attackers exploiting memory vulnerabilities. Configuration management controls like baseline configuration and least functionality can help prevent vulnerability exploitation by enforcing secure system configurations, enabling memory protection, and removing unnecessary services, ports, or functions that could be exploited. Memory protection controls mitigate the risk of potential memory corruption by enforcing runtime protections. Finally, process isolation and encryption of data at rest reduce the potential impacts in the case of successful exploitation by isolating compromised processes and ensuring sensitive data remains secure even in the event of memory corruption.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-30774"
        },
        {
          "category": "external",
          "summary": "RHBZ#2187139",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187139"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-30774",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-30774",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30774"
        }
      ],
      "release_date": "2023-04-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: heap buffer overflow issues related to TIFFTAG_INKNAMES and related TIFFTAG_NUMBEROFINKS value"
    },
    {
      "cve": "CVE-2023-30775",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2023-04-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2187141"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the libtiff library. This security flaw causes a heap buffer overflow in extractContigSamples32bits, tiffcrop.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: Heap buffer overflow in extractContigSamples32bits, tiffcrop.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer to CWE-787: Out-of-bounds Write vulnerability, and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nBoundary protection, access enforcement, and least privilege controls limit access to the platform and memory, ensuring only authorized users and processes can interact with sensitive components. This reduces the risk of attackers exploiting memory vulnerabilities. Configuration management controls like baseline configuration and least functionality can help prevent vulnerability exploitation by enforcing secure system configurations, enabling memory protection, and removing unnecessary services, ports, or functions that could be exploited. Memory protection controls mitigate the risk of potential memory corruption by enforcing runtime protections. Finally, process isolation and encryption of data at rest reduce the potential impacts in the case of successful exploitation by isolating compromised processes and ensuring sensitive data remains secure even in the event of memory corruption.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
          "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
          "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-30775"
        },
        {
          "category": "external",
          "summary": "RHBZ#2187141",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187141"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-30775",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-30775"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-30775",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30775"
        }
      ],
      "release_date": "2023-04-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-05-09T10:02:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:2340"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
            "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
            "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: Heap buffer overflow in extractContigSamples32bits, tiffcrop.c"
    }
  ]
}
  rhsa-2024:3059
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for libtiff is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.\n\nSecurity Fix(es):\n\n* libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c (CVE-2022-4645)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.10 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:3059",
        "url": "https://access.redhat.com/errata/RHSA-2024:3059"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index"
      },
      {
        "category": "external",
        "summary": "2176220",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176220"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3059.json"
      }
    ],
    "title": "Red Hat Security Advisory: libtiff security update",
    "tracking": {
      "current_release_date": "2025-09-25T13:10:15+00:00",
      "generator": {
        "date": "2025-09-25T13:10:15+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:3059",
      "initial_release_date": "2024-05-22T09:28:57+00:00",
      "revision_history": [
        {
          "date": "2024-05-22T09:28:57+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-22T09:28:57+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T13:10:15+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.10.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux CRB (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux CRB (v. 8)",
                  "product_id": "CRB-8.10.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-31.el8.src",
                "product": {
                  "name": "libtiff-0:4.0.9-31.el8.src",
                  "product_id": "libtiff-0:4.0.9-31.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-31.el8?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-31.el8.aarch64",
                "product": {
                  "name": "libtiff-0:4.0.9-31.el8.aarch64",
                  "product_id": "libtiff-0:4.0.9-31.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-31.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-31.el8.aarch64",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-31.el8.aarch64",
                  "product_id": "libtiff-devel-0:4.0.9-31.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-31.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-31.el8.aarch64",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-31.el8.aarch64",
                  "product_id": "libtiff-debugsource-0:4.0.9-31.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-31.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
                  "product_id": "libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-31.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-31.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.0.9-31.el8.aarch64",
                "product": {
                  "name": "libtiff-tools-0:4.0.9-31.el8.aarch64",
                  "product_id": "libtiff-tools-0:4.0.9-31.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-31.el8?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-31.el8.ppc64le",
                "product": {
                  "name": "libtiff-0:4.0.9-31.el8.ppc64le",
                  "product_id": "libtiff-0:4.0.9-31.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-31.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-31.el8.ppc64le",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-31.el8.ppc64le",
                  "product_id": "libtiff-devel-0:4.0.9-31.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-31.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
                  "product_id": "libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-31.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
                  "product_id": "libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-31.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-31.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.0.9-31.el8.ppc64le",
                "product": {
                  "name": "libtiff-tools-0:4.0.9-31.el8.ppc64le",
                  "product_id": "libtiff-tools-0:4.0.9-31.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-31.el8?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-31.el8.i686",
                "product": {
                  "name": "libtiff-0:4.0.9-31.el8.i686",
                  "product_id": "libtiff-0:4.0.9-31.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-31.el8?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-31.el8.i686",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-31.el8.i686",
                  "product_id": "libtiff-devel-0:4.0.9-31.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-31.el8?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-31.el8.i686",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-31.el8.i686",
                  "product_id": "libtiff-debugsource-0:4.0.9-31.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-31.el8?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-31.el8.i686",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-31.el8.i686",
                  "product_id": "libtiff-debuginfo-0:4.0.9-31.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-31.el8?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-31.el8?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-31.el8.x86_64",
                "product": {
                  "name": "libtiff-0:4.0.9-31.el8.x86_64",
                  "product_id": "libtiff-0:4.0.9-31.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-31.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-31.el8.x86_64",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-31.el8.x86_64",
                  "product_id": "libtiff-devel-0:4.0.9-31.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-31.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-31.el8.x86_64",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-31.el8.x86_64",
                  "product_id": "libtiff-debugsource-0:4.0.9-31.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-31.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
                  "product_id": "libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-31.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-31.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.0.9-31.el8.x86_64",
                "product": {
                  "name": "libtiff-tools-0:4.0.9-31.el8.x86_64",
                  "product_id": "libtiff-tools-0:4.0.9-31.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-31.el8?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libtiff-0:4.0.9-31.el8.s390x",
                "product": {
                  "name": "libtiff-0:4.0.9-31.el8.s390x",
                  "product_id": "libtiff-0:4.0.9-31.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff@4.0.9-31.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-devel-0:4.0.9-31.el8.s390x",
                "product": {
                  "name": "libtiff-devel-0:4.0.9-31.el8.s390x",
                  "product_id": "libtiff-devel-0:4.0.9-31.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-31.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debugsource-0:4.0.9-31.el8.s390x",
                "product": {
                  "name": "libtiff-debugsource-0:4.0.9-31.el8.s390x",
                  "product_id": "libtiff-debugsource-0:4.0.9-31.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-31.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-debuginfo-0:4.0.9-31.el8.s390x",
                "product": {
                  "name": "libtiff-debuginfo-0:4.0.9-31.el8.s390x",
                  "product_id": "libtiff-debuginfo-0:4.0.9-31.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-31.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
                "product": {
                  "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
                  "product_id": "libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-31.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libtiff-tools-0:4.0.9-31.el8.s390x",
                "product": {
                  "name": "libtiff-tools-0:4.0.9-31.el8.s390x",
                  "product_id": "libtiff-tools-0:4.0.9-31.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-31.el8?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.src"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.src",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-tools-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.src as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.src"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.src",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debuginfo-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-debugsource-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-debugsource-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-devel-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-devel-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-tools-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-tools-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-tools-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-tools-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.i686"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64"
        },
        "product_reference": "libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-4645",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2023-03-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2176220"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in tiffcp, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the tiffcp function in tools/tiffcp.c, resulting in a denial of service and limited information disclosure.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "libtiff is a general purpose library to manipulate TIFF images. The library itself is not used directly, it\u0027s used via another application linked with the library, which means this issue can only be triggered by an application processing untrusted images. Therefore, if there is no way an attacker can provide a crafted image to an application, it\u0027s likely not possible to exploit this CVE.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.aarch64",
          "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.i686",
          "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.ppc64le",
          "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.s390x",
          "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.src",
          "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.x86_64",
          "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
          "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.i686",
          "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
          "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.s390x",
          "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
          "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.aarch64",
          "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.i686",
          "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
          "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.s390x",
          "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.x86_64",
          "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.aarch64",
          "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.i686",
          "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.ppc64le",
          "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.s390x",
          "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.x86_64",
          "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.aarch64",
          "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.ppc64le",
          "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.s390x",
          "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.x86_64",
          "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
          "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
          "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
          "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
          "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64",
          "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.aarch64",
          "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.i686",
          "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.ppc64le",
          "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.s390x",
          "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.src",
          "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.x86_64",
          "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
          "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.i686",
          "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
          "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.s390x",
          "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
          "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.aarch64",
          "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.i686",
          "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
          "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.s390x",
          "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.x86_64",
          "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.aarch64",
          "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.i686",
          "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.ppc64le",
          "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.s390x",
          "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.x86_64",
          "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.aarch64",
          "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.ppc64le",
          "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.s390x",
          "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.x86_64",
          "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
          "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
          "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
          "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
          "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-4645"
        },
        {
          "category": "external",
          "summary": "RHBZ#2176220",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176220"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-4645",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4645",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4645"
        }
      ],
      "release_date": "2023-03-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-22T09:28:57+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.src",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.src",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3059"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.src",
            "AppStream-8.10.0.GA:libtiff-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.x86_64",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
            "AppStream-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.src",
            "CRB-8.10.0.GA:libtiff-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-debuginfo-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-debugsource-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-devel-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-tools-0:4.0.9-31.el8.x86_64",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.aarch64",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.i686",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.ppc64le",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.s390x",
            "CRB-8.10.0.GA:libtiff-tools-debuginfo-0:4.0.9-31.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c"
    }
  ]
}
  msrc_cve-2022-4645
Vulnerability from csaf_microsoft
Notes
{
  "document": {
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Public",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "category": "general",
        "text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
        "title": "Disclaimer"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "secure@microsoft.com",
      "name": "Microsoft Security Response Center",
      "namespace": "https://msrc.microsoft.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "CVE-2022-4645 LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948 allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources the fix is available with commit e8131125. - VEX",
        "url": "https://msrc.microsoft.com/csaf/vex/2023/msrc_cve-2022-4645.json"
      },
      {
        "category": "external",
        "summary": "Microsoft Support Lifecycle",
        "url": "https://support.microsoft.com/lifecycle"
      },
      {
        "category": "external",
        "summary": "Common Vulnerability Scoring System",
        "url": "https://www.first.org/cvss"
      }
    ],
    "title": "LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948 allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources the fix is available with commit e8131125.",
    "tracking": {
      "current_release_date": "2023-03-07T00:00:00.000Z",
      "generator": {
        "date": "2025-10-20T00:21:27.840Z",
        "engine": {
          "name": "MSRC Generator",
          "version": "1.0"
        }
      },
      "id": "msrc_CVE-2022-4645",
      "initial_release_date": "2023-03-10T00:00:00.000Z",
      "revision_history": [
        {
          "date": "2023-03-07T00:00:00.000Z",
          "legacy_version": "1",
          "number": "1",
          "summary": "Information published."
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "1.0",
                "product": {
                  "name": "CBL Mariner 1.0",
                  "product_id": "16820"
                }
              },
              {
                "category": "product_version",
                "name": "2.0",
                "product": {
                  "name": "CBL Mariner 2.0",
                  "product_id": "17086"
                }
              }
            ],
            "category": "product_name",
            "name": "Azure Linux"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003ccm1 libtiff 4.5.0-1",
                "product": {
                  "name": "\u003ccm1 libtiff 4.5.0-1",
                  "product_id": "2"
                }
              },
              {
                "category": "product_version",
                "name": "cm1 libtiff 4.5.0-1",
                "product": {
                  "name": "cm1 libtiff 4.5.0-1",
                  "product_id": "17977"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003ccbl2 libtiff 4.5.0-1",
                "product": {
                  "name": "\u003ccbl2 libtiff 4.5.0-1",
                  "product_id": "1"
                }
              },
              {
                "category": "product_version",
                "name": "cbl2 libtiff 4.5.0-1",
                "product": {
                  "name": "cbl2 libtiff 4.5.0-1",
                  "product_id": "18440"
                }
              }
            ],
            "category": "product_name",
            "name": "libtiff"
          }
        ],
        "category": "vendor",
        "name": "Microsoft"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccm1 libtiff 4.5.0-1 as a component of CBL Mariner 1.0",
          "product_id": "16820-2"
        },
        "product_reference": "2",
        "relates_to_product_reference": "16820"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cm1 libtiff 4.5.0-1 as a component of CBL Mariner 1.0",
          "product_id": "17977-16820"
        },
        "product_reference": "17977",
        "relates_to_product_reference": "16820"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccbl2 libtiff 4.5.0-1 as a component of CBL Mariner 2.0",
          "product_id": "17086-1"
        },
        "product_reference": "1",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 libtiff 4.5.0-1 as a component of CBL Mariner 2.0",
          "product_id": "18440-17086"
        },
        "product_reference": "18440",
        "relates_to_product_reference": "17086"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-4645",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "general",
          "text": "GitLab",
          "title": "Assigning CNA"
        }
      ],
      "product_status": {
        "fixed": [
          "17977-16820",
          "18440-17086"
        ],
        "known_affected": [
          "16820-2",
          "17086-1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-4645 LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948 allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources the fix is available with commit e8131125. - VEX",
          "url": "https://msrc.microsoft.com/csaf/vex/2023/msrc_cve-2022-4645.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-03-07T00:00:00.000Z",
          "details": "4.5.0-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "16820-2",
            "17086-1"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "environmentalsScore": 0.0,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "temporalScore": 5.5,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "16820-2",
            "17086-1"
          ]
        }
      ],
      "title": "LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948 allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources the fix is available with commit e8131125."
    }
  ]
}
  cnvd-2023-15744
Vulnerability from cnvd
厂商已发布了漏洞修复程序,请及时关注更新: https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246
| Name | Libtiff LibTiff 4.4.0 | 
|---|
{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2022-4645",
      "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2022-4645"
    }
  },
  "description": "LibTIFF\u662f\u4e00\u4e2a\u8bfb\u5199TIFF\uff08\u6807\u7b7e\u56fe\u50cf\u6587\u4ef6\u683c\u5f0f\uff09\u6587\u4ef6\u7684\u5e93\u3002\u8be5\u5e93\u5305\u542b\u4e00\u4e9b\u5904\u7406TIFF\u6587\u4ef6\u7684\u547d\u4ee4\u884c\u5de5\u5177\u3002\n\nLibTIFF 4.4.0\u7248\u672c\u5b58\u5728\u8d8a\u754c\u8bfb\u53d6\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5bf9\u7528\u6237\u63d0\u4f9b\u7684\u6570\u636e\u7f3a\u4e4f\u9002\u5f53\u7684\u9a8c\u8bc1\uff0c\u653b\u51fb\u8005\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7\u7279\u5236\u7684tiff\u6587\u4ef6\u9020\u6210\u7cfb\u7edf\u62d2\u7edd\u670d\u52a1\u3002",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2023-15744",
  "openTime": "2023-03-09",
  "patchDescription": "LibTIFF\u662f\u4e00\u4e2a\u8bfb\u5199TIFF\uff08\u6807\u7b7e\u56fe\u50cf\u6587\u4ef6\u683c\u5f0f\uff09\u6587\u4ef6\u7684\u5e93\u3002\u8be5\u5e93\u5305\u542b\u4e00\u4e9b\u5904\u7406TIFF\u6587\u4ef6\u7684\u547d\u4ee4\u884c\u5de5\u5177\u3002\r\n\r\nLibTIFF 4.4.0\u7248\u672c\u5b58\u5728\u8d8a\u754c\u8bfb\u53d6\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5bf9\u7528\u6237\u63d0\u4f9b\u7684\u6570\u636e\u7f3a\u4e4f\u9002\u5f53\u7684\u9a8c\u8bc1\uff0c\u653b\u51fb\u8005\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7\u7279\u5236\u7684tiff\u6587\u4ef6\u9020\u6210\u7cfb\u7edf\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "LibTIFF\u8d8a\u754c\u8bfb\u53d6\u6f0f\u6d1e\uff08CNVD-2023-15744\u7684\u8865\u4e01",
  "products": {
    "product": "Libtiff LibTiff 4.4.0"
  },
  "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2022-4645",
  "serverity": "\u4e2d",
  "submitTime": "2023-03-07",
  "title": "LibTIFF\u8d8a\u754c\u8bfb\u53d6\u6f0f\u6d1e\uff08CNVD-2023-15744"
}
  gsd-2022-4645
Vulnerability from gsd
{
  "GSD": {
    "alias": "CVE-2022-4645",
    "description": "LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.",
    "id": "GSD-2022-4645",
    "references": [
      "https://www.suse.com/security/cve/CVE-2022-4645.html"
    ]
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2022-4645"
      ],
      "details": "LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.",
      "id": "GSD-2022-4645",
      "modified": "2023-12-13T01:19:15.479248Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "cve@gitlab.com",
        "ID": "CVE-2022-4645",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "libtiff",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "\u003c=4.4.0"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "libtiff"
            }
          ]
        }
      },
      "credit": [
        {
          "lang": "eng",
          "value": "wangdw.augustus@gmail.com"
        }
      ],
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125."
          }
        ]
      },
      "impact": {
        "cvss": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
          "version": "3.1"
        }
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "Out-of-bounds read in libtiff"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://gitlab.com/libtiff/libtiff/-/issues/277",
            "refsource": "MISC",
            "url": "https://gitlab.com/libtiff/libtiff/-/issues/277"
          },
          {
            "name": "https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246",
            "refsource": "MISC",
            "url": "https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246"
          },
          {
            "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json",
            "refsource": "CONFIRM",
            "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json"
          },
          {
            "name": "FEDORA-2023-6c1200da3d",
            "refsource": "FEDORA",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BA6GRCAQ7NR2OK5N44UQRGUJBIYKWJJH/"
          },
          {
            "name": "FEDORA-2023-f5d075f7f2",
            "refsource": "FEDORA",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZTFA6GGOKFPIQNHDBMXYUR4XUXUJESE/"
          },
          {
            "name": "FEDORA-2023-40b675d7ae",
            "refsource": "FEDORA",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLM763GGZVVOAXIQXG6YGTYJ5VFYNECQ/"
          },
          {
            "name": "https://security.netapp.com/advisory/ntap-20230331-0001/",
            "refsource": "CONFIRM",
            "url": "https://security.netapp.com/advisory/ntap-20230331-0001/"
          }
        ]
      }
    },
    "gitlab.com": {
      "advisories": [
        {
          "affected_range": "\u003c=4.4.0",
          "affected_versions": "All versions up to 4.4.0",
          "cvss_v3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "cwe_ids": [
            "CWE-1035",
            "CWE-125",
            "CWE-937"
          ],
          "date": "2023-03-31",
          "description": "LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.",
          "fixed_versions": [],
          "identifier": "CVE-2022-4645",
          "identifiers": [
            "CVE-2022-4645"
          ],
          "not_impacted": "",
          "package_slug": "conan/libtiff",
          "pubdate": "2023-03-03",
          "solution": "Unfortunately, there is no solution available yet.",
          "title": "Out-of-bounds Read",
          "urls": [
            "https://nvd.nist.gov/vuln/detail/CVE-2022-4645",
            "https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246",
            "https://gitlab.com/libtiff/libtiff/-/issues/277",
            "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json"
          ],
          "uuid": "53d1ccf9-c421-4e6f-b30c-fa9539d941c2"
        }
      ]
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "4.4.0",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@gitlab.com",
          "ID": "CVE-2022-4645"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "CWE-125"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246",
              "refsource": "MISC",
              "tags": [
                "Patch"
              ],
              "url": "https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246"
            },
            {
              "name": "https://gitlab.com/libtiff/libtiff/-/issues/277",
              "refsource": "MISC",
              "tags": [
                "Exploit",
                "Issue Tracking",
                "Vendor Advisory"
              ],
              "url": "https://gitlab.com/libtiff/libtiff/-/issues/277"
            },
            {
              "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json",
              "refsource": "CONFIRM",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json"
            },
            {
              "name": "FEDORA-2023-6c1200da3d",
              "refsource": "FEDORA",
              "tags": [],
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BA6GRCAQ7NR2OK5N44UQRGUJBIYKWJJH/"
            },
            {
              "name": "FEDORA-2023-f5d075f7f2",
              "refsource": "FEDORA",
              "tags": [],
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZTFA6GGOKFPIQNHDBMXYUR4XUXUJESE/"
            },
            {
              "name": "FEDORA-2023-40b675d7ae",
              "refsource": "FEDORA",
              "tags": [],
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLM763GGZVVOAXIQXG6YGTYJ5VFYNECQ/"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20230331-0001/",
              "refsource": "CONFIRM",
              "tags": [],
              "url": "https://security.netapp.com/advisory/ntap-20230331-0001/"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV3": {
          "cvssV3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "exploitabilityScore": 1.8,
          "impactScore": 3.6
        }
      },
      "lastModifiedDate": "2023-03-31T11:15Z",
      "publishedDate": "2023-03-03T16:15Z"
    }
  }
}
  ghsa-6fr2-gj2w-xgr6
Vulnerability from github
LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.
{
  "affected": [],
  "aliases": [
    "CVE-2022-4645"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-125"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2023-03-03T16:15:00Z",
    "severity": "MODERATE"
  },
  "details": "LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.",
  "id": "GHSA-6fr2-gj2w-xgr6",
  "modified": "2023-03-09T15:30:50Z",
  "published": "2023-03-03T18:30:27Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4645"
    },
    {
      "type": "WEB",
      "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json"
    },
    {
      "type": "WEB",
      "url": "https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246"
    },
    {
      "type": "WEB",
      "url": "https://gitlab.com/libtiff/libtiff/-/issues/277"
    },
    {
      "type": "WEB",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZTFA6GGOKFPIQNHDBMXYUR4XUXUJESE"
    },
    {
      "type": "WEB",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BA6GRCAQ7NR2OK5N44UQRGUJBIYKWJJH"
    },
    {
      "type": "WEB",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLM763GGZVVOAXIQXG6YGTYJ5VFYNECQ"
    },
    {
      "type": "WEB",
      "url": "https://security.netapp.com/advisory/ntap-20230331-0001"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "type": "CVSS_V3"
    }
  ]
}
  fkie_cve-2022-4645
Vulnerability from fkie_nvd
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
| URL | Tags | ||
|---|---|---|---|
| cve@gitlab.com | https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json | Third Party Advisory | |
| cve@gitlab.com | https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246 | Patch | |
| cve@gitlab.com | https://gitlab.com/libtiff/libtiff/-/issues/277 | Exploit, Issue Tracking, Vendor Advisory | |
| cve@gitlab.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZTFA6GGOKFPIQNHDBMXYUR4XUXUJESE/ | Third Party Advisory | |
| cve@gitlab.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BA6GRCAQ7NR2OK5N44UQRGUJBIYKWJJH/ | Third Party Advisory | |
| cve@gitlab.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLM763GGZVVOAXIQXG6YGTYJ5VFYNECQ/ | Third Party Advisory | |
| cve@gitlab.com | https://security.netapp.com/advisory/ntap-20230331-0001/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://gitlab.com/libtiff/libtiff/-/issues/277 | Exploit, Issue Tracking, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZTFA6GGOKFPIQNHDBMXYUR4XUXUJESE/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BA6GRCAQ7NR2OK5N44UQRGUJBIYKWJJH/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLM763GGZVVOAXIQXG6YGTYJ5VFYNECQ/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20230331-0001/ | Third Party Advisory | 
| Vendor | Product | Version | |
|---|---|---|---|
| fedoraproject | fedora | 36 | |
| fedoraproject | fedora | 37 | |
| fedoraproject | fedora | 38 | |
| libtiff | libtiff | * | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E05D8B0C-6AE1-497D-96BF-374E0D63321A",
              "versionEndIncluding": "4.4.0",
              "versionStartIncluding": "3.5.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125."
    }
  ],
  "evaluatorComment": "n",
  "id": "CVE-2022-4645",
  "lastModified": "2025-04-04T21:15:42.243",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.5,
        "impactScore": 4.2,
        "source": "cve@gitlab.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-03-03T16:15:09.777",
  "references": [
    {
      "source": "cve@gitlab.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json"
    },
    {
      "source": "cve@gitlab.com",
      "tags": [
        "Patch"
      ],
      "url": "https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246"
    },
    {
      "source": "cve@gitlab.com",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://gitlab.com/libtiff/libtiff/-/issues/277"
    },
    {
      "source": "cve@gitlab.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZTFA6GGOKFPIQNHDBMXYUR4XUXUJESE/"
    },
    {
      "source": "cve@gitlab.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BA6GRCAQ7NR2OK5N44UQRGUJBIYKWJJH/"
    },
    {
      "source": "cve@gitlab.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLM763GGZVVOAXIQXG6YGTYJ5VFYNECQ/"
    },
    {
      "source": "cve@gitlab.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20230331-0001/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://gitlab.com/libtiff/libtiff/-/issues/277"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZTFA6GGOKFPIQNHDBMXYUR4XUXUJESE/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BA6GRCAQ7NR2OK5N44UQRGUJBIYKWJJH/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLM763GGZVVOAXIQXG6YGTYJ5VFYNECQ/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20230331-0001/"
    }
  ],
  "sourceIdentifier": "cve@gitlab.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.